
Configuring IPSec Mobile User VPN
212
Firebox X Edge e-Series
names to IP addresses. The trusted interface of the Edge must have access to these servers. Type a
DNS server and WINS server IP address in the text boxes near the bottom of the Mobile User page.
Enabling MUVPN access for a Firebox user account
1
Add a new Firebox user or edit a Firebox user, as described in “Using Local Firebox
Authentication” on page 158.
2
Click the
MUVPN
tab.
3
Select the
Enable MUVPN for this account
check box.
4
Type a shared key in the related field.
The .wgx file is encrypted with this shared key. The user enters the shared key when the .wgx file
is imported. Do not give the shared key to any user that is not authorized to use this Firebox user
account.
5
Type the virtual IP address in the related field.
The virtual IP address must be an address on the Firebox X Edge trusted or optional network that
is not used. This address is used by the remote computer to connect to the Firebox X Edge.
6
From the
Authentication Algorithm
drop-down list, select the type of authentication.
The options are MD5-HMAC and SHA1-HMAC.
7
From the
Encryption Algorithm
drop-down list, select the type of encryption.
The options are DES-CBC, 3DES-CBC, AES 128-bit, AES 192-bit, or AES 256-bit.
8
Set MUVPN key expiration in kilobytes and/or hours. The default values are 8192 KB and 24
hours.
To remove a size and/or time expiration, set the value to zero (0).
9
From the
VPN Client Type
drop-down list, select
Mobile User
if the remote user is connecting
from a desktop or laptop computer.
10
Select the
All traffic uses tunnel (0.0.0.0/0 IP Subnet)
check box if the remote client sends all
its traffic (including usual web traffic) through the VPN tunnel to the Firebox X Edge. This can also
let the MUVPN client connect with other networks that the Edge connects to.
If you do not select this check box, the remote user can connect with the Firebox X Edge trusted
or optional network only. You must select this check box for the remote user to be able to
connect to:
- Networks on the other side of a Branch Office VPN tunnel that the Edge has connected.
- Computers on the Edge’s optional network.
- Networks that are behind a static route on the trusted or optional interface. For more
information, see “Making Static Routes” on page 69.
11
Click
Submit
.
Summary of Contents for Firebox X20E
Page 20: ...The Firebox X Edge and Your Network 8 Firebox X Edge e Series...
Page 32: ...Using the Quick Setup Wizard 20 Firebox X Edge e Series...
Page 64: ...Viewing the Configuration File 52 Firebox X Edge e Series...
Page 92: ...Configuring BIDS 80 Firebox X Edge e Series...
Page 102: ...Configuring the Wireless Card on Your Computer 90 Firebox X Edge e Series...
Page 114: ...Configuring Policies for the Optional Network 102 Firebox X Edge e Series...
Page 138: ...Using Additional Services for Proxies 126 Firebox X Edge e Series...
Page 158: ...Working with Firewall NAT 146 Firebox X Edge e Series...
Page 166: ...Using Certificates on the Firebox X Edge 154 Firebox X Edge e Series...
Page 208: ...Updating Gateway AV IPS 196 Firebox X Edge e Series...
Page 220: ...Frequently Asked Questions 208 Firebox X Edge e Series...
Page 302: ...Limited Hardware Warranty 290 Firebox X Edge e Series...
Page 310: ...298 Firebox X Edge e Series...