•
VPN Monitor—When enabled, the device sends ICMP echo requests (pings) through
the tunnel at specified intervals (configurable in seconds) to monitor network
connectivity (the device uses the IP address of the local outgoing interface as the
source address and the IP address of the remote gateway as the destination address).
If the ping activity indicates that the VPN monitoring status has changed, the device
triggers an SNMP trap; VPN Monitor (in RealTime Monitor) tracks these SNMP statistics
for VPN traffic in the tunnel and displays the tunnel status.
•
Rekey—When enabled, the device regenerates the IKE key after a failed VPN tunnel
attempts to reestablish itself. When disabled, the device monitors the tunnel only when
the VPN passes user-generated traffic (instead of using device-generated ICMP echo
requests). Use the rekey option to:
•
Keep the VPN tunnel up even when traffic is not passing through
•
Monitor devices at the remote site.
•
Enable dynamic routing protocols to learn routes at a remote site and transmit
messages through the tunnel.
•
Automatically populate the next-hop tunnel binding table (NHTB table) and the
route table when multiple VPN tunnels are bound to a single tunnel interface.
•
Optimized—When enabled, the device optimizes its VPN monitoring behavior as follows:
•
Considers incoming traffic in the VPN tunnel as ICMP echo replies. This reduces false
alarms that might occur when traffic through the tunnel is heavy and the echo replies
cannot get through.
•
Suppresses VPN monitoring pings when the tunnel passes both incoming and
outgoing traffic. This can help reduce network traffic.
•
Source Interface and Destination IP—Configure these options to use VPN Monitoring
when the other end of the VPN tunnel is not a security device. Specify the source and
destination IP addresses.
Adding a VPN Rule
After you have configured the VPN on each device you want to include in the VPN, you
can add a VPN rule to a security policy:
•
For policy-based VPNs, you must add a VPN rule to create the VPN tunnel.
•
For route-based VPNs, the VPN tunnel is already in place. However, you might want
to add a VPN rule to control traffic through the tunnel.
For details on adding and configuring a VPN rule in a security policy, see “Adding VPN
Rules” on page 615.
Creating Manual Key VPNs
Creating a device-level Manual Key VPN is a four stage process:
1.
Configure XAuth Users
2.
Configure Routes (Route-based only)
Copyright © 2010, Juniper Networks, Inc.
610
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...