605
Field descriptions
Policy field descriptions
VPN Tunnels
Virtual Private Network (VPN) technology lets you securely extend the boundaries of your internal
network through the use of VPN tunnels. Tunnels are used to let either a single user or a remote
network gain access to your protected resources. Connections are usually encrypted to ensure privacy
and authenticated to ensure integrity.
IPsec static key tunnel Properties—General tab
For IPsec with static key, both ends of the tunnel must have the same parameters, including secret
keys, security parameter indices (SPIs), authentication schemes, and encryption methods.
Associated tasks
The task that you can perform with this tab is:
■
“Manually configuring a tunnel using IPsec with static key”
Table D-40
IPsec static key tunnel Properties—General tab
Field
Description
Enable
Indicates whether this option is enabled.
This option is checked by default.
Name
A unique name for the VPN tunnel.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores (_).
Do not include spaces in the name. The characters @, !, #, $, %,
^
, &, *, <, >, and other
reserved characters are also invalid.
Local endpoint
Network entity to serve as the local tunnel endpoint.
Local gateway
Security gateway network entity to serve as the local gateway interface.
Remote endpoint
Network entity to serve as the remote tunnel endpoint.
Remote gateway
Security gateway network entity to serve as the remote gateway interface.
VPN policy
VPN policy to use with your tunnel.
You must select a static VPN policy. The selection you make for the tunnel
(static_default_crypto, static_default_crypto_strong, static_aes_crypto_strong, or any
static policy that you have created) determines what further configuration information is
needed.
Caption
An optional, brief description of the VPN tunnel.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...