770
IPSec
N0008589 3.3
You can create these rules automatically when creating or modifying Branch Office and Remote
Tunnels by selecting
Yes
for the
Create Firewall Rules for this tunnel
on the Parameters page
for a particular tunnel. The three firewall rules required by the Branch Office tunnels are then
created. You can view these rules on the Input Filters' Rule Setting screen for the interface used. If
the Branch Office tunnel is enabled and IPSec is enabled globally, then the three rules created are
added to the front of the Rule Order that appears on the Input Filters' Rule Order screen for the
interface used. If the Branch Office tunnel is later disabled, then the rules are removed from the
Rule Order, but still exist on the Input Filters' Rule Setting screen. If the user selects
No
for the
Create Firewall Rules for this tunnel
option, then the three firewall rules created for the Branch
Office tunnel are deleted.
You can also create firewall rules for Remote User tunnels. The rule creation process is the same
as for Branch Office tunnels except that the user must select which interface they want to create
firewall rules for. The six rules in
Table 226
to
Table 231
are created for Remote User tunnels if
you select
Yes
for the
Create Firewall Rules for Interface
option.
Table 226
Firewall rules for IKE
Protocol
UDP
Source IP
Remote Endpoint address for Branch Office; Client PC IP address for Remote User
Source Mask
255.255.255.255
Source Port
500
Destination IP
Local Endpoint address
Destination Mask
255.255.255.255
Destination Port
500
Table 227
Firewall rules for ESP
Protocol
IPSEC_ESP
Source IP
Remote Endpoint address for Branch Office; Client PC IP address for Remote User
Source Mask
255.255.255.255
Destination IP
Local Endpoint address
Destination Mask
255.255.255.255
Table 228
Firewall rules for AH
Protocol
IPSEC_AH
Source IP
Remote Endpoint address for Branch Office; Client PC IP address for Remote User
Source Mask
255.255.255.255
Destination IP
Local Endpoint address
Destination Mask
255.255.255.255
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...