Symantec 360R Administration Guide - Page 81

Establishing secure VPN connections

Page 81 highlights

6 Chapter Establishing secure VPN connections This chapter includes the following topics: ■ About using this chapter ■ Creating security policies ■ Identifying users ■ Configuring Gateway-to-Gateway tunnels ■ Configuring Client-to-Gateway VPN tunnels ■ Monitoring VPN tunnel status Virtual Private Networks (VPNs) let you securely extend the boundaries of your internal network and use insecure communication channels (such as the Internet) to safely transport sensitive data. VPNs are used to allow a single user or remote network to access the protected resources of another network. Symantec Gateway Security 300 Series appliances support three types of VPN tunnels: Gateway-to-Gateway, Client-to-Gateway, and wireless Client-toGateway. To configure wireless Client-to-Gateway tunnels, see the Symantec Gateway Security 300 Series Wireless Implementation Guide. Securing your network connections using VPN technology is an important step in ensuring the quality and integrity of your data. This section describes some key concepts and components you need to understand to effectively configure and use the appliance's VPN feature. VPN tunnels can also support dynamic and static Gateway-to-Gateway configurations, where tunnel parameters are created at each security gateway. Both ends must have the same parameters, including secret keys, security parameter indexes (SPIs), authentication schemes, encryption methods.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

Chapter
6
Establishing secure VPN
connections
This chapter includes the following topics:
About using this chapter
Creating security policies
Identifying users
Configuring Gateway-to-Gateway tunnels
Configuring Client-to-Gateway VPN tunnels
Monitoring VPN tunnel status
Virtual Private Networks (VPNs) let you securely extend the boundaries of your
internal network and use insecure communication channels (such as the
Internet) to safely transport sensitive data. VPNs are used to allow a single user
or remote network to access the protected resources of another network.
Symantec Gateway Security 300 Series appliances support three types of VPN
tunnels: Gateway-to-Gateway, Client-to-Gateway, and wireless Client-to-
Gateway. To configure wireless Client-to-Gateway tunnels, see the
Symantec
Gateway Security 300 Series Wireless Implementation Guide
.
Securing your network connections using VPN technology is an important step
in ensuring the quality and integrity of your data. This section describes some
key concepts and components you need to understand to effectively configure
and use the appliance’s VPN feature.
VPN tunnels can also support dynamic and static Gateway-to-Gateway
configurations, where tunnel parameters are created at each security gateway.
Both ends must have the same parameters, including secret keys, security
parameter indexes (SPIs), authentication schemes, encryption methods.