
605
Field descriptions
Policy field descriptions
VPN Tunnels
Virtual Private Network (VPN) technology lets you securely extend the boundaries of your internal
network through the use of VPN tunnels. Tunnels are used to let either a single user or a remote
network gain access to your protected resources. Connections are usually encrypted to ensure privacy
and authenticated to ensure integrity.
IPsec static key tunnel Properties—General tab
For IPsec with static key, both ends of the tunnel must have the same parameters, including secret
keys, security parameter indices (SPIs), authentication schemes, and encryption methods.
Associated tasks
The task that you can perform with this tab is:
■
“Manually configuring a tunnel using IPsec with static key”
Table D-40
IPsec static key tunnel Properties—General tab
Field
Description
Enable
Indicates whether this option is enabled.
This option is checked by default.
Name
A unique name for the VPN tunnel.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores (_).
Do not include spaces in the name. The characters @, !, #, $, %,
^
, &, *, <, >, and other
reserved characters are also invalid.
Local endpoint
Network entity to serve as the local tunnel endpoint.
Local gateway
Security gateway network entity to serve as the local gateway interface.
Remote endpoint
Network entity to serve as the remote tunnel endpoint.
Remote gateway
Security gateway network entity to serve as the remote gateway interface.
VPN policy
VPN policy to use with your tunnel.
You must select a static VPN policy. The selection you make for the tunnel
(static_default_crypto, static_default_crypto_strong, static_aes_crypto_strong, or any
static policy that you have created) determines what further configuration information is
needed.
Caption
An optional, brief description of the VPN tunnel.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...