
614
Field descriptions
Policy field descriptions
IPsec IKE policy Properties—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
IPsec static key policy Properties—General tab
For IPsec static policies, the keys that are assigned are based on how you configure the policy and
always remain the same.
Associated tasks
The task that you can perform with this tab is:
■
“Creating a VPN policy for IPsec with static key”
Selected
Lists Diffie-Hellman groups that are used in the policy.
The default is group 1 then group2.
Up
Moves the selected item in the Selected list up in the list.
If more than one algorithm is assigned, the first one is tried, and if unsuccessful, the next
algorithm is tried.
Down
Moves the selected item in the Selected list down in the list.
Table D-49
IPsec static key policy Properties—General tab
Field
Description
Policy name
A unique name for the VPN policy.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores (_).
Do not include spaces in the name. The characters @, !, #, $, %,
^
, &, *, <, >, and other
reserved characters are also invalid.
Filter applied
Applies a filter as part of the VPN policy.
The options are:
■
Sample_Denial-of-Service_filter
■
Blank
■
Any filter you have previously configured
The default is (none).
Apply firewall rules
Passes VPN traffic to security gateway proxies.
Enabling this feature sends the data packets up the protocol stack for authorization. The
packets are then subject to all the address transforms performed by the proxies in
accordance with the configured rules. This check box is unchecked by default.
Table D-48
IPsec IKE policy Properties—Diffie-Hellman Preference tab (Continued)
Field
Description
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...