Symantec 360R Administration Guide - Page 84

Creating custom Phase 2 VPN policies, Configuring a VPN policy is optional for dynamic tunnels.

Page 84 highlights

84 Establishing secure VPN connections Creating security policies and then later associate them with multiple secure tunnels. You can select a predefined policy, or you can create your own using the VPN Policies tab. VPN policies group together common characteristics for tunnels, and allow rapid setup of additional tunnels with the same characteristics. The security gateway also includes a handful of commonly used VPN policies, for both static and dynamic tunnels. You can define more than one VPN policy, varying the components you select for each one. If you do this, ensure that your naming conventions let you distinguish between policies that use the same encapsulation mode. When you are ready to create your secure tunnels, clearly defined naming conventions will make selecting the correct VPN policy easier. Note: You cannot delete pre-defined VPN policies. Creating custom Phase 2 VPN policies VPN Policies are pre-configured for typical VPN setups. If you require customized settings (for compatibility with 3rd party equipment, for example) then you can create a custom Phase 2 Policy on the VPN Policies tab. A VPN policy groups together common characteristics for VPN tunnels. Rather than configuring data privacy, data integrity, and data compression algorithms for every tunnel that you create, you can configure standard, reusable VPN policies and apply them to multiple secure tunnels. Note: Configuring a VPN policy is optional for dynamic tunnels. To create a custom Phase 2 VPN policy See "VPN Policies tab field descriptions" on page 200. 1 In the SGMI, in the left pane, click VPN. 2 In the right pane, on the VPN Policies tab, under IPsec Security Association (Phase 2) Parameters, in the Name text box, type a name for the VPN policy. 3 To edit an existing policy, from the VPN Policy drop-down list, select a VPN policy. 4 On the Data Integrity (Authentication) drop-down list, select an authentication. 5 On the Data Confidentiality (Encryption) drop-down list, select an encryption type.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

84
Establishing secure VPN connections
Creating security policies
and then later associate them with multiple secure tunnels. You can select a pre-
defined policy, or you can create your own using the VPN Policies tab.
VPN policies group together common characteristics for tunnels, and allow
rapid setup of additional tunnels with the same characteristics. The security
gateway also includes a handful of commonly used VPN policies, for both static
and dynamic tunnels.
You can define more than one VPN policy, varying the components you select
for each one. If you do this, ensure that your naming conventions let you
distinguish between policies that use the same encapsulation mode. When you
are ready to create your secure tunnels, clearly defined naming conventions will
make selecting the correct VPN policy easier.
Note:
You cannot delete pre-defined VPN policies.
Creating custom Phase 2 VPN policies
VPN Policies are pre-configured for typical VPN setups. If you require
customized settings (for compatibility with 3rd party equipment, for example)
then you can create a custom Phase 2 Policy on the VPN Policies tab.
A VPN policy groups together common characteristics for VPN tunnels. Rather
than configuring data privacy, data integrity, and data compression algorithms
for every tunnel that you create, you can configure standard, reusable VPN
policies and apply them to multiple secure tunnels.
Note:
Configuring a VPN policy is optional for dynamic tunnels.
To create a custom Phase 2 VPN policy
See
“VPN Policies tab field descriptions”
on page 200.
1
In the SGMI, in the left pane, click
VPN
.
2
In the right pane, on the VPN Policies tab, under IPsec Security Association
(Phase 2) Parameters, in the Name text box, type a name for the VPN policy.
3
To edit an existing policy, from the VPN Policy drop-down list, select a VPN
policy.
4
On the Data Integrity (Authentication) drop-down list, select an
authentication.
5
On the Data Confidentiality (Encryption) drop-down list, select an
encryption type.