Symantec 360R Administration Guide - Page 85
Viewing VPN Policies List, Identifying users
UPC - 037648240185
View all Symantec 360R manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 85 highlights
Establishing secure VPN connections 85 Identifying users 6 In the SA Lifetime text box, type the number of minutes you want the security association to stay alive before a rekey occurs. The VPN tunnel is temporarily interrupted when rekeys occur. 7 In the Data Volume Limit text box, type the number of kilobytes of traffic to allow before a rekey occurs. 8 In the Inactivity Timeout text box, type the number of minutes of inactivity before a rekey occurs. 9 To use Perfect Forward Secrecy, do the following: ■ On the Perfect Forward Secrecy drop-down list, select a Diffie-Hellman group. ■ Next to Perfect Forward Secrecy, click Enable. 10 Click Add. Viewing VPN Policies List The VPN Policies List section of the VPN Policies window displays a summary of each VPN Policy that is configured on the appliance. Table 6-2 defines each field in the VPN Policies List summary. Table 6-2 VPN Policies List fields Field Name Encryption Method SA Lifetime Data Volume Limit Inactivity Timeout PFS Description Displays the name of the VPN Policy. Displays the encryption method selected for the VPN Policy. Displays the configured SA Lifetime setting. Displays the configured Data Volume Limit setting. Displays the configured inactivity timeout setting. Shows the Perfect Forward Secrecy setting. Identifying users The appliance lets you configure two types of clients that use VPN: users and users with extended authentication.