10.02.2013 Views

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table of Contents<br />

Delegating resource policy management ...............................................741<br />

Delegating resource profile management ..............................................742<br />

Defining general system administrator role settings ....................................743<br />

Defining default options for administrator roles ....................................743<br />

Managing general role settings and options...........................................743<br />

Specifying access management options for the role ..............................744<br />

Specifying general session options ........................................................744<br />

Specifying UI options.............................................................................745<br />

Delegating access to IVS systems ..........................................................746<br />

Chapter 29 Instant Virtual System (IVS) 747<br />

Licensing: IVS availability.............................................................................748<br />

Deploying an IVS .........................................................................................748<br />

Virtualized IVE architecture ...................................................................750<br />

Signing in to the root system or the IVS .......................................................751<br />

Signing-in using the sign-in URL prefix ..................................................751<br />

Signing-in over virtual ports...................................................................753<br />

Signing-in over a VLAN interface ...........................................................754<br />

Navigating to the IVS .............................................................................754<br />

Determining the subscriber profile...............................................................754<br />

IVS Configuration Worksheet.................................................................754<br />

Administering the root system ..............................................................756<br />

Configuring the root administrator ........................................................757<br />

Provisioning an IVS......................................................................................757<br />

Understanding the provisioning process ......................................................758<br />

Configuring sign-in ports..............................................................................760<br />

Configuring the external port.................................................................760<br />

Configuring a virtual port for sign-in on the external port......................761<br />

Configuring a virtual port for sign-in on the internal port.......................761<br />

Configuring a Virtual Local Area Network (VLAN).........................................762<br />

Configuring VLANs on the virtualized IVE..............................................763<br />

Adding static routes to the VLAN route table .........................................764<br />

Deleting a VLAN ....................................................................................765<br />

Loading the certificates server......................................................................766<br />

Creating a virtual system (IVS profile) ..........................................................766<br />

Creating a new IVS profile .....................................................................766<br />

Signing in directly to the IVS as an IVS administrator...................................768<br />

Configuring role-based source IP aliasing .....................................................769<br />

Associating roles with VLANs and the source IP address........................770<br />

Configuring virtual ports for a VLAN ......................................................770<br />

Associating roles with source IP addresses in an IVS .............................770<br />

Configuring policy routing rules on the IVS ..................................................771<br />

Routing Rules ........................................................................................772<br />

Overlapping IP address spaces ..............................................................773<br />

Define Resource policies........................................................................773<br />

Clustering a virtualized IVE ..........................................................................773<br />

Configuring DNS for the IVS.........................................................................774<br />

<strong>Access</strong>ing a DNS server on the MSP network.........................................775<br />

<strong>Access</strong>ing a DNS server on a subscriber company intranet....................775<br />

Configuring Network Connect for use on a virtualized IVE ...........................777<br />

Configuring the Network Connect connection profile ............................777<br />

Configuring Network Connect on backend routers ................................777<br />

Configuring a centralized DHCP server ........................................................780<br />

Configuring authentication servers...............................................................782<br />

Table of Contents � xix

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!