165
Defining your security environment
Defining traffic endpoints with network entities
■
Domain name
Your address type selection determines the name of the field that follows the Address type drop-
down list.
5
Depending on what you chose from the Address type drop-down list, do one of the following:
6
To use IKE policies on tunnels to the security gateway, check
Enable IKE (Internet Key Exchange/
ISAKMP)
.
This is only required for dynamic VPN tunnels.
7
Under IKE Parameters, type the Phase 1 ID for tunnel negotiation.
A Phase 1 ID is only needed for some configurations. If you leave this text box blank, the IP address
is used.
8
If you enabled IKE in step 6, do the following:
9
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
10
Click
OK
.
11
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
12
Use the subnet network entity for any of the following:
■
To specify the local or remote gateway in an IPsec static or gateway-to-gateway VPN tunnel,
or local gateway in a Client VPN tunnel.
■
To specify the source or destination of traffic in rules and packet filters.
Related information
For further information related to this topic, see the following:
■
“Security Gateway Network Entity Properties—General tab”
■
“Security Gateway Network Entity Properties—Security Gateway tab”
■
If you selected Interface
In the Interface drop-down list, select the interface of the security gateway.
If you selected VIP
In the VIP drop-down list, select the virtual IP address of the security gateway.
If you selected IP address
In the IP address text box, type then IP address of the security gateway.
If you selected Domain name In the Domain Name text box, type the fully-qualified domain name of the
security gateway.
Certificates
If your address type is an IP address or domain name and you are using
certificates, click
Certificate
.
To use Certificate as the authentication type, you must configure Entrust.
Shared secret
If your address type is an IP address or domain name and you are using a
shared secret, click
Shared Secret,
and then, in the Shared Secret text box,
type the shared secret used for tunnel negotiations.
To display the shared secret, click
Reveal
.
When you click Reveal, the button becomes a Hide button. To hide the shared
secret, click
Hide
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...