user group objects, configuring in firewall
rules......................................................................................462
user objects
about...............................................................................404
configuring in firewall rules......................................462
external...........................................................................405
local.................................................................................404
using external user groups in VPNs.....................406
using MIPs as source or destination in firewall
rules......................................................................................450
V
validation icons......................................................................192
vendor specific attributes
See
VSAs
version of attack object database.................................293
Violation Viewer.....................................................................719
VIPs
global objects................................................................416
virtual chassis
activating with dynamic IP address......................136
activating with static IP address............................134
importing with dynamic IP address.......................125
importing with static IP address..............................116
virtual security devices
See
VSD
virtual workspace wallpaper image..............................282
virus pattern file, updating on device...........................300
VPN links, in firewall rules..................................................441
VPN Manager
about.........................................................................29, 552
adding policy-based members..............................570
adding RAS users.........................................................572
adding routing-based members............................572
adding the VPN............................................................569
adding the VPN link....................................................585
autogenerating VPN rules........................................582
configuring ASN1-DN.................................................580
configuring FQDN.......................................................580
configuring gateway...................................................576
configuring gateway security..................................578
configuring gateway, heartbeats............................577
configuring gateway, mode......................................576
configuring gateway, NAT Traversal......................577
configuring IKE IDs......................................................579
configuring IKE properties.......................................580
configuring L2TP...........................................................571
configuring NAT............................................................570
configuring NAT with incoming DIP......................570
configuring NAT with MIP, VIP, and Outgoing
DIP..................................................................................571
configuring NAT with tunnel interface and
zone...............................................................................571
configuring overrides..................................................583
configuring overrides, device
configuration............................................................584
configuring overrides, policy rules.........................583
configuring Phase 1 proposals................................579
configuring Phase 2 proposals...............................582
configuring PKI..............................................................579
configuring preshared key........................................578
configuring preshared secrets................................579
configuring termination points...............................576
configuring topology...................................................574
configuring topology, full mesh..............................576
configuring topology, hub and spoke...................574
configuring topology, main and branch...............575
configuring topology, site-to-site..........................576
configuring XAuth........................................................577
creating VPNs...............................................................568
default termination point.........................................569
device tunnel summary............................................584
editing VPNs.................................................................585
enable dial backup......................................................570
enabling a VPN............................................................569
enabling VPN Monitor................................................581
enabling VPN Monitor, rekey....................................581
expanded view...................................................552, 585
view properties............................................................569
VPN Monitor
about...............................................................................690
enabling...........................................................................581
permission to view........................................................86
VPN rules in firewall rulebase...........................................441
VPN status summary, viewing........................................690
VPNs
creating with VPN Manager....................................568
device-level, about.....................................................553
device-level, adding VPN rules...............................615
device-level, AutoKey IKE VPNs............................602
device-level, L2TP VPNs...........................................614
device-level, L2TP-over-AutoKey IKE
VPNs.............................................................................615
device-level, manual key VPNs..............................610
device-level, supported configurations...............601
display filter...................................................................692
distribution device-specific view...........................667
filter...................................................................................691
monitoring status.......................................................690
permissions......................................................................87
975
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...