
Configuring the IRE VPN Client for use with the Firewall
137
9
Select the
Manual IPSec
and the
Logging
radio buttons.
10
Press the
Edit
button. Select the SPI Key for this VPN Tunnel.
11
Press the
OK
button when finished with the IPSec properties and press
the
OK
button when finished with the Encryption properties.
12
From the Policy menu, select
Install
to activate the security policy. The VPN
tunnel will function once the remote Firewall has been configured with a
corresponding security association.
Configuring the
Firewall
1
Go to the
VPN Configure
screen in the Firewall Web interface. Create a
Firewall Security Association, using manual key encryption, and name it
Check Point
(any name will work). Do not use the
Allow Remote Clients
checkbox.
2
Enter a valid destination address range (referring to the LAN behind
Check Point). Specify the Check Point's external address as the IPSec
Gateway address.
3
Select the Encryption Method
Encrypt for Checkpoint (ESP DES rfc1829)
.
Make sure the Encryption Key and the SPIs match the values specified in
the Check Point screens (The Firewall doesn't need the '0x' prefixes to
denote hexadecimal fields like the Check Point does). There is no need for
an authentication key.
4
Update the screen and restart Firewall to activate the VPN configuration.
Configuring the IRE
VPN Client for use
with the Firewall
This section covers the configuration of the Firewall VPN capability and
the installation of the IRE VPN Client Software. There are several parts to
this process:
■
Setting up the GroupVPN Security Association
■
Installing the IRE VPN Client Software
■
Configuring the IRE VPN Client
DUA1611-0AAA02.book Page 137 Thursday, August 2, 2001 4:01 PM
Содержание SUPERSTACK 3CR16110-95
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM...