393
Providing remote access using VPN tunnels
Configuring tunnels
Manually configuring a gateway-to-gateway VPN tunnel
Gateway-to-gateway VPN tunnels using IPsec with IKE are used as tunnels between two IPsec-
compliant security gateways.
For each gateway-to-gateway tunnel you create, you must configure a security gateway and network
entity local to your site, as well as a security gateway and network entity at the remote end of the
tunnel.
Prerequisites
None.
To configure a gateway-to-gateway VPN Tunnel
1
In the SGMI, in the left pane, under Policy, click
VPN
.
2
In the right pane, on the Tunnels tab, click
New > Gateway-to-Gateway tunnel
.
3
In the Gateway-to-Gateway tunnel Properties dialog box, on the General tab, do the following:
4
Click
OK
.
Enable
To enable the tunnel, check
Enable
.
Name
Type a unique name for the tunnel.
VPN policy
In the drop-down list, select a VPN policy to use with your tunnel.
Global IKE policy
The global IKE policy is displayed. This field is read-only.
Local endpoint
In the drop-down list, select a network entity to serve as the local tunnel endpoint.
Remote endpoint
In the drop-down list, select a network entity to serve as the remote tunnel endpoint.
Local gateway
In the drop-down list, select a security gateway network entity to serve as the local
gateway interface for the tunnel.
Remote gateway
In the drop-down list, select a security gateway network entity to serve as the remote
gateway interface for the tunnel.
Caption
Type a brief description of the tunnel.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...