Refer
e
nc
e
Man
ual
for
the
Pr
oSafe
8
02.11
g
Wire
less
VPN F
irewa
ll FVG31
8
Ad
va
nced
Vir
tu
a
l Private Networ
kin
g
7-
7
BETA
Th
e VP
N –
A
uto
Po
lic
y field
s
ar
e
defined
in th
e follo
wing
table.
Ta
ble 7-
1.
VPN
–
Aut
o
Polic
y
Co
nfigu
rat
io
n Fie
ld
s
Field D
escr
ip
tio
n
Ge
ner
al
T
hese
se
tting
s
id
entify
thi
s po
licy and de
te
rmi
ne it
s majo
r
cha
racte
risti
cs.
Poli
cy
Name
T
he
descrip
tive
na
me of
the
VPN
poli
cy
. Ea
ch
po
licy sh
ould
ha
ve a
un
ique
p
olicy name
. Th
is
n
ame is not
su
ppli
ed to
the
remo
te VPN end
poin
t. It
is
o
nly used
to hel
p
yo
u iden
tify VPN
p
oli
ci
es.
IKE Poli
cy
T
he exi
stin
g IKE pol
icies are prese
nte
d in a drop
-d
own li
st.
Note:
Create the IKE pol
icy
BEF
ORE creatin
g a
VPN - Auto
p
olicy
.
Remote VPN En
dpoi
nt
T
he ad
dress used to locate the remote VPN
firewa
ll or clien
t to
w
hich you
w
ish to conn
ect. Th
e
re
mo
te
VPN end
p
oint mu
st have
this FVG318
’s
Local
IP va
lue
s
en
te
red as it
s Remote VPN End
po
int.
•
B
y i
ts
Fu
lly
Qu
al
ifie
d D
oma
in
Na
me (FQDN)
— your doma
in name.
•
B
y
its IP Address.
Address
Ty
pe
T
he
add
re
ss typ
e use
d to l
ocate the
remote VPN firewa
ll
or clie
nt to
whi
ch
yo
u wish to
co
nnect.
•
B
y i
ts
Fu
lly
Qu
al
ifie
d D
oma
in
Na
me (FQDN)
— your doma
in name.
•
B
y
its IP Address.
Address Dat
a
T
he ad
dress used to locate the remote VPN
firewa
ll or clien
t to
w
hich you
w
ish to conn
ect. Th
e
re
mo
te
VPN end
p
oint mu
st have
this FVG318
’s
Local
Ide
ntity Dat
a entere
d
a
s
its Remote VPN
En
dpoi
nt.
•
B
y i
ts
Fu
lly
Qu
al
ifie
d D
oma
in
Na
me (FQDN)
— your doma
in name.
•
B
y
its IP Address.
SA
L
ife
T
ime
T
he du
ration of the
Se
curity Associa
tio
n before it expires.
•
S
e
co
nds —
the
amo
unt
o
f time before the SA
e
xp
ires.
Over an hou
r
is
co
mmon
(3
600).
•
K
by
te
s
— th
e am
ou
nt
of
tra
ffi
c be
fo
re
th
e SA
ex
pi
re
s.
One
of th
ese can be set without setti
ng th
e other
.
IPSe
c PF
S
If
e
nabl
ed, se
curity
is
en
han
ce
d by
e
nsurin
g tha
t the key is
ch
ange
d at
re
gula
r in
te
rva
ls. Also
, even
if
one
key is broken
, subse
que
nt keys are no
e
asier to break.
Ea
ch
ke
y
ha
s
n
o re
lation
ship to th
e previou
s
key
.
PFS
Key
Grou
p
If PFS is e
nab
led, this se
tting
determine
s th
e DH g
roup
bit size u
se
d in
th
e
ke
y excha
nge
. Th
is mu
st match
the
val
ue used
o
n
the
remo
te ga
te
way
.
Содержание FVG318 - ProSafe 802.11g Wireless VPN Firewall 8 Router
Страница 14: ...Reference Manual for the ProSafe 802 11g Wireless VPN Firewall FVG318 1 4 About This Manual BETA ...
Страница 24: ...Reference Manual for the ProSafe 802 11g Wireless VPN Firewall FVG318 2 10 Introduction BETA ...
Страница 136: ...Reference Manual for the ProSafe 802 11g Wireless VPN Firewall FVG318 7 28 Advanced Virtual Private Networking BETA ...
Страница 154: ...Reference Manual for the ProSafe 802 11g Wireless VPN Firewall FVG318 9 10 Advanced Configuration BETA ...
Страница 162: ...Reference Manual for the ProSafe 802 11g Wireless VPN Firewall FVG318 10 8 Troubleshooting BETA ...