Creating L2TP VPNs
Creating device-level L2TP VPN is a three stage process:
•
Adding L2TP Users on page 614
•
Configuring L2TP on page 614
•
Adding a VPN Rule on page 615
Adding L2TP Users
For VPNs that use L2TP to provide remote access services, you must add an L2TP User
to the security device. An L2TP User has an account on the security device that guards
the protected resources in the VPN; when the user attempts to connect to a protected
resource, the security device authenticates the user.
To add a L2TP User for a security device, in the security device configuration
L2TP/XAuth/Local User, click the Add icon. Enter a name for the user, then specify:
•
User—Select a preconfigured Local User object that is configured for L2TP.
•
Remote Setting—Select a preconfigured Remote Settings object.
•
IP Pool—Select a preconfigured IP Pool object.
•
Static IP—Enter the static IP address of the Local User.
Configuring L2TP
To connect to an L2TP VPN tunnel, the L2TP RAS user uses the IP address and WINS/DNS
information assigned by the user’s ISP. However, when the L2TP RAS user sends VPN
traffic through the tunnel, the security device assigns a new IP address and WINS/DNS
information that enables the traffic to reach the destination network.
Enter a name for the L2TP VPN, then specify the following information:
•
Host Name—Enter the name of the L2TP host.
•
Outgoing Interface—The outgoing interface is the interface on the security device that
sends and receives VPN traffic. Typically, the outgoing interface is in the untrust zone.
•
Keep Alive—The number of seconds a VPN member waits between sending hello
packets to an L2TP RAS user.
•
Peer IP—Enter the IP address of the L2TP peer.
•
Secret—Enter the shared secret that authenticates communication in the L2TP tunnel.
•
Remote Settings—Select the preconfigured remote settings object that represents
the DNS and WINS servers assigned to L2TP RAS users after they have connected to
the tunnel.
•
IP Pool Name—Select the preconfigured IP pool object that represents the available
IP addresses that can be assigned to L2TP RAS users after they have connected to
the tunnel.
•
Auth Server
Copyright © 2010, Juniper Networks, Inc.
614
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...