•
Use transport mode for L2TP-over-AutoKey IKE VPNs. NSM does not encapsulate
the IP packet, meaning that the original IP header must remain in plaintext. However,
the original IP packet can be authenticated, and the payload can be encrypted.
•
Do not set Fragment Bit in the Outer Header—The Fragment Bit controls how the IP
packet is fragmented when traveling across networks.
•
Clear. Use this option to enable IP packets to be fragmented.
•
Set. Use this option to ensure that IP packets are not fragmented.
•
Copy. Select to use the same option as specified in the internal IP header of the
original packet.
Monitor
You can enable VPN Monitor and configure the monitoring parameters for the device.
Monitoring is off by default. To enable the VPN Monitor in Realtime Monitor to display
statistics for the VPN tunnel, configure the following:
•
VPN Monitor—When enabled, the security devices in the VPN send ICMP echo requests
(pings) through the tunnel at specified intervals (configurable in seconds) to monitor
network connectivity (each device uses the IP address of the local outgoing interface
as the source address and the IP address of the remote gateway as the destination
address). If the ping activity indicates that the VPN monitoring status has changed,
the device triggers an SNMP trap; the VPN Monitor (in RealTime Monitor) tracks these
SNMP statistics for VPN traffic in the tunnel and displays the tunnel status.
•
Rekey—When enabled, the security devices in the VPN regenerate the IKE key after a
failed VPN tunnel attempts to reestablish itself. When disabled, each device monitors
the tunnel only when the VPN passes user-generated traffic (instead of using
device-generated ICMP echo requests). Use the rekey option to:
•
Enable dynamic routing protocols to learn routes and transmit messages through
the tunnel.
•
Automatically populate the next-hop tunnel binding table (NHTB table) and the
route table when multiple VPN tunnels are bound to a single tunnel interface.
For details on VPN monitoring at the device level, see the
Juniper Networks ScreenOS 5.x
Concepts and Examples Guide
.
Differentiated Services Code Point Mark
If you want to set the Differentiated Services Code Point (DSCP) field of the IPSec IPv4
header to a specified value for each route-based VPN at the Phase2 configuration level,
devices running ScreenOS 6.1 and later allow you to on both ASIC and non-ASIC platforms.
ScreenOS 6.1 and later support the DSCP value configuration for tunnel mode ESP
packets only.
You cannot configure the DSCP setting if:
•
The IPSec mode is transport.
581
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Configuring VPNs
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...