
396
Providing remote access using VPN tunnels
Configuring tunnels
4
On the Keys tab, do the following:
5
On the Description tab, you can add a more detailed description of the tunnel than you typed on the
General tab in the Caption text box.
6
Click
OK
.
7
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Before using the static tunnel, you must stop and restart the security gateway.
8
After creating the tunnel, you can use it in the following ways:
■
To specify how traffic arrives or leaves the security gateway, by including it in a rule.
■
To specify how traffic arrives at the security gateway, by including it in an address transform.
Related information
For further information related to this topic, see the following:
■
“IPsec static key tunnel Properties—General tab”
Generate Keys
If you have chosen to use a data integrity preference in your VPN policy, click
Generate
Keys
.
The appropriate key fields are available according to your VPN policy selection. It is
strongly recommended that you use the Generate Keys button rather than creating your
own keys.
Local network entity
key
Type the data integrity key for the local entity.
Remote network
entity key
Type the data integrity key for the remote entity.
Local network entity
key 1/2/3
Type the data privacy algorithm for the local entity.
The combination Data Integrity Algorithm = None and Data Privacy Algorithm = None
is not permitted within a VPN policy.
Remote network
entity key 1/2/3
Type the data privacy algorithm for the remote end of the tunnel.
Reveal Keys
By default, generated or manually entered keys are hidden. To see what the actual key
values are, click
Reveal Keys
.
Authentication
header SPIs Local
network entity
Type the Security Parameter Index (SPI) for the local endpoint of the tunnel.
Authentication
header SPIs Remote
network entity
Type the SPI for the remote endpoint of the tunnel.
Encryption header
SPIs Local network
entity
Type the SPI for the local endpoint of the tunnel.
Encryption header
SPIs Remote network
entity
Type the SPI for the remote endpoint of the tunnel.
Generate Keys
To generate keys, click
Generate Keys
.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...