382
Providing remote access using VPN tunnels
Understanding VPN policies
6
On the Data Compression Preference tab, in the Available list box, select a data compression
preference, and then click the right-arrow
>>
button to move it to the Selected list box. Supported
types are:
■
LZS (compresses data by replacing redundant strings with abbreviated tokens)
■
No compression
7
On the Diffie-Hellman Preference tab, in the Available list box, select a group, and then click the
right-arrow
>>
button to move it to the Selected list box.
8
On the Description tab, you can type a more detailed description than you typed in the Caption text
box.
9
Click
OK
.
You will need to reboot the security gateway before the changes to your VPN policy take effect.
10
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
11
To use the VPN policy, do one of the following:
■
Create a VPN tunnel, and select the VPN policy.
■
Create a clientless VPN rule with VPN as the network application type.
Related information
For further information related to this topic, see the following:
■
“IPsec IKE policy Properties—General tab”
■
“IPsec/IKE policy Properties—Data Privacy Preference tab”
■
“IPsec IKE policy Properties—Data Integrity Preference tab”
■
“IPsec IKE policy Properties—Data Compression Preference tab”
■
“IPsec IKE policy Properties—Diffie-Hellman Preference tab”
■
Creating a VPN policy for IPsec with static key
You can configure a VPN policy with static IKE to support static VPN tunnels. In static VPN tunnels,
both tunnel endpoints must have the same secret keys, security parameter indexes (SPIs), and
encryption and authentication schemes.
Prerequisites
None.
To configure a VPN policy for IPsec with static key
1
In the SGMI, in the left pane, under Policy, click
VPN
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...