Example: Configuring an Autokey IKE, Policy-Based Site-to-Site VPN
An AutoKey IKE VPN connects protected resources using AutoKey IKE. Use this VPN type
to connect and control traffic between two security devices. In this example, an AutoKey
IKE tunnel using a pair of certificates (one at each end of the tunnel) provides the secure
connection between the Tokyo and Paris offices. For the Phase 1 and 2 security levels,
you specify the Phase 1 proposal as rsa-g2-3des-sha and select the predefined
"Compatible” set of proposals for Phase 2. It is assumed that both participants already
have RSA certificates and are using Entrust as the certificate authority (CA). All zones
are in the trust-vr.
1.
Configure security devices.
a.
Configure the Tokyo device with the following interfaces:
•
Ethernet1 is the Trust IP (10.1.1.1/24) in the Trust zone.
•
Ethernet3 is the Untrust IP (1.1.1.1/24) in the Untrust zone.
b.
Configure the Paris device with the following interfaces:
•
Ethernet1 is the Trust IP (10.2.2.1/24) in the Trust zone.
•
Ethernet3 is the Untrust IP (2.2.2.2/24) in the Untrust zone.
2.
Create the address objects that you will use to create Protected Resources (for
details on creating or editing address objects,. If you imported a security device, the
address book objects configured on that device are automatically imported as
Aaddress objects into the NSM UI.
a.
Add the Tokyo Trust LAN (10.1.1.0/24) as a network address object. In Address
Objects, click the Add icon and select
Network
. Configure the following, then
click
OK
:
•
For Name, enter Tokyo
Trust LAN.
•
For IP Address/Netmask, enter
10.1.1.0/24.
•
For Color, select
magenta
.
•
For Comment, enter
Tokyo Trust Zone
.
b.
Add the Paris Trust LAN (10.2.2.0/24) as a network address object. In Address
Objects, click the Add icon and select
Network
. Configure the following, then
click
OK
:
•
For Name, enter
Paris Trust LAN.
•
For IP Address/Netmask, enter
10.2.2.0/24.
•
For Color, select
magenta
.
•
For Comment, enter
Paris Trust Zone
.
3.
Create the Tokyo Protected Resources object. In Protected Resources (under VPN
Manager), click the Add icon. Configure as shown in Figure 87 on page 579, then click
OK
:
Copyright © 2010, Juniper Networks, Inc.
578
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...