Symantec 360R Administration Guide - Page 82

About using this Creating security policies, Understanding VPN policies

Page 82 highlights

82 Establishing secure VPN connections About using this chapter About using this chapter Each section begins with an explanation of the feature it is describing (such as what a VPN policy is, how it works, and how you use it). If you are an experienced network or IT administrator, you may want to proceed directly to the latter half of the section for configuration instructions. If you do not have significant network or IT experience or have never configured a security gateway (Symantec or otherwise), you should read the first half of each section before configuring the feature. At the end of "Configuring Gateway-to-Gateway tunnels" on page 88 and "Configuring Client-to-Gateway VPN tunnels" on page 96, there are worksheets for you to fill out with the information you entered so that you may easily share connection information with your clients and remote gateway administrators. Creating security policies The VPN tunnel establishment negotiation occurs in two phases. In Phase 1, the Internet Key Exchange (IKE) negotiation creates an IKE security association with its peer to protect Phase 2 of the negotiation, which determines the protocol security association for the tunnel. For Gateway-to-Gateway connections, either security gateway can initiate Phase 1 or Phase 2 renegotiation at any time. Either security gateway can also specify intervals after which to renegotiate. For Client-to-Gateway connections, only the client can initiate Phase 1 or Phase 2 renegotiation. Phase 2 renegotiation is referred to as quick mode renegotiation. Note: Symantec Gateway Security 300 Series does not support VPN tunnel compression. To create a Gateway-to-Gateway tunnel between an Symantec Gateway Security 300 Series appliance and a remote Symantec Gateway Security 5400 Series appliance or Symantec Enterprise Firewall, set the compression to NONE on the remote gateway. Understanding VPN policies For each phase of negotiation, the appliance uses a policy, which is a predefined set of parameters. The appliance supports two types of security policies, Global IKE and VPN.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

82
Establishing secure VPN connections
About using this chapter
About using this chapter
Each section begins with an explanation of the feature it is describing (such as
what a VPN policy is, how it works, and how you use it). If you are an
experienced network or IT administrator, you may want to proceed directly to
the latter half of the section for configuration instructions.
If you do not have significant network or IT experience or have never configured
a security gateway (Symantec or otherwise), you should read the first half of
each section before configuring the feature.
At the end of
“Configuring Gateway-to-Gateway tunnels”
on page 88 and
“Configuring Client-to-Gateway VPN tunnels”
on page 96, there are worksheets
for you to fill out with the information you entered so that you may easily share
connection information with your clients and remote gateway administrators.
Creating security policies
The VPN tunnel establishment negotiation occurs in two phases. In Phase 1, the
Internet Key Exchange (IKE) negotiation creates an IKE security association
with its peer to protect Phase 2 of the negotiation, which determines the
protocol security association for the tunnel. For Gateway-to-Gateway
connections, either security gateway can initiate Phase 1 or Phase 2
renegotiation at any time. Either security gateway can also specify intervals
after which to renegotiate. For Client-to-Gateway connections, only the client
can initiate Phase 1 or Phase 2 renegotiation. Phase 2 renegotiation is referred
to as quick mode renegotiation.
Note:
Symantec Gateway Security 300 Series does not support VPN tunnel
compression. To create a Gateway-to-Gateway tunnel between an Symantec
Gateway Security 300 Series appliance and a remote Symantec Gateway
Security 5400 Series appliance or Symantec Enterprise Firewall, set the
compression to NONE on the remote gateway.
Understanding VPN policies
For each phase of negotiation, the appliance uses a policy, which is a predefined
set of parameters. The appliance supports two types of security policies, Global
IKE and VPN.