
792
Field descriptions
Menu option field descriptions
Confirmation panel
In the Confirmation panel, you can review the gateway-to-gateway tunnel information.
If you are satisfied that the information is correct, click Finish to create the tunnel or configure the
connection.
To make changes, click Back to return to a previous panel.
Associated tasks
The task that you can perform with this panel is:
■
“Running the Gateway-to-Gateway Tunnel Wizard”
■
Global IKE policy
The security gateway includes a predefined global IKE policy that applies to all Internet Security
Association and Key Management Protocol (ISAKMP/Oakley) secure tunnels. This policy works in
conjunction with the IPsec/IKE VPN policy you configure to perform Phase 1 negotiations for VPN
tunnels. You can have only one global IKE policy, but you may change the values of the default policy at
any time.
Global IKE Policy Properties—General tab
The Global IKE policy General tab lets you set the timeout interval for VPN tunnels.
Associated tasks
The task that you can perform with this tab is:
■
“Viewing or modifying the global IKE policy”
Global IKE Policy Properties—Data Privacy Preference tab
The Data Privacy Preference tab lets you select the level of encryption in VPN tunnels.
Table D-294
Global IKE Policy Properties—General tab
Field
Description
Policy Name
Name of the global IKE policy. This is a read-only field.
Connection Timeout Interval (minutes) for connection timeout.
The default is 1080 minutes (18 hours). If you are using Client VPN tunnels, do not set this
to less than the default value.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...