Symantec 360R Administration Guide - Page 85

Viewing VPN Policies List, Identifying users

Page 85 highlights

Establishing secure VPN connections 85 Identifying users 6 In the SA Lifetime text box, type the number of minutes you want the security association to stay alive before a rekey occurs. The VPN tunnel is temporarily interrupted when rekeys occur. 7 In the Data Volume Limit text box, type the number of kilobytes of traffic to allow before a rekey occurs. 8 In the Inactivity Timeout text box, type the number of minutes of inactivity before a rekey occurs. 9 To use Perfect Forward Secrecy, do the following: ■ On the Perfect Forward Secrecy drop-down list, select a Diffie-Hellman group. ■ Next to Perfect Forward Secrecy, click Enable. 10 Click Add. Viewing VPN Policies List The VPN Policies List section of the VPN Policies window displays a summary of each VPN Policy that is configured on the appliance. Table 6-2 defines each field in the VPN Policies List summary. Table 6-2 VPN Policies List fields Field Name Encryption Method SA Lifetime Data Volume Limit Inactivity Timeout PFS Description Displays the name of the VPN Policy. Displays the encryption method selected for the VPN Policy. Displays the configured SA Lifetime setting. Displays the configured Data Volume Limit setting. Displays the configured inactivity timeout setting. Shows the Perfect Forward Secrecy setting. Identifying users The appliance lets you configure two types of clients that use VPN: users and users with extended authentication.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

85
Establishing secure VPN connections
Identifying users
6
In the SA Lifetime text box, type the number of minutes you want the
security association to stay alive before a rekey occurs.
The VPN tunnel is temporarily interrupted when rekeys occur.
7
In the Data Volume Limit text box, type the number of kilobytes of traffic to
allow before a rekey occurs.
8
In the Inactivity Timeout text box, type the number of minutes of inactivity
before a rekey occurs.
9
To use Perfect Forward Secrecy, do the following:
On the Perfect Forward Secrecy drop-down list, select a Diffie-Hellman
group.
Next to Perfect Forward Secrecy, click
Enable
.
10
Click
Add
.
Viewing VPN Policies List
The VPN Policies List section of the VPN Policies window displays a summary of
each VPN Policy that is configured on the appliance.
Table 6-2
defines each field
in the VPN Policies List summary.
Identifying users
The appliance lets you configure two types of clients that use VPN: users and
users with extended authentication.
Table 6-2
VPN Policies List fields
Field
Description
Name
Displays the name of the VPN Policy.
Encryption Method
Displays the encryption method selected for the VPN
Policy.
SA Lifetime
Displays the configured SA Lifetime setting.
Data Volume Limit
Displays the configured Data Volume Limit setting.
Inactivity Timeout
Displays the configured inactivity timeout setting.
PFS
Shows the Perfect Forward Secrecy setting.