Symantec 360R Administration Guide - Page 88

Viewing the User List, Configuring Gateway-to-Gateway tunnels

Page 88 highlights

88 Establishing secure VPN connections Configuring Gateway-to-Gateway tunnels ■ In the RADIUS Group Binding text box, type the name of the user's RADIUS group. The RADIUS group is assigned to the user on the RADIUS server. The RADIUS server must return the value that you type in the RADIUS Group Binding text box in the filterID attribute. 7 Click Save. Viewing the User List The User List section in the Client Users window displays a summary of each static user that is configured on the appliance. Table 6-3 defines each field in the summary. Table 6-3 User list fields Field Description User Name Enable Pre-Shared Key VPN Group User name entered for the static VPN user. Indicates whether a particular user can establish VPN tunnels to the security gateway. Displays the pre-shared key entered for the user. Lists the VPN Groups for which a user is configured. Configuring Gateway-to-Gateway tunnels Gateway-to-Gateway tunnels help secure your internal network by providing a secure bridge to an external LAN. There are several tasks involved in successfully securing the network with Gateway-to-Gateway tunnels. The following section describes the Gateway-to-Gateway tunnels, and then provides procedures for configuring the tunnels. Understanding Gateway-to-Gateway tunnels You might want to make your network resources available to an outside group, such as another office of the company. Instead of requiring each user on the second network to establish their own, private secure connection, you can create one Gateway-to-Gateway tunnel, which makes resources on each network available to the other. This type of tunnel is LAN-to-LAN, instead of user-toLAN.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

88
Establishing secure VPN connections
Configuring Gateway-to-Gateway tunnels
In the RADIUS Group Binding text box, type the name of the user’s
RADIUS group.
The RADIUS group is assigned to the user on the RADIUS server. The
RADIUS server must return the value that you type in the RADIUS
Group Binding text box in the filterID attribute.
7
Click
Save
.
Viewing the User List
The User List section in the Client Users window displays a summary of each
static user that is configured on the appliance.
Table 6-3
defines each field in the
summary.
Configuring Gateway-to-Gateway tunnels
Gateway-to-Gateway tunnels help secure your internal network by providing a
secure bridge to an external LAN. There are several tasks involved in
successfully securing the network with Gateway-to-Gateway tunnels. The
following section describes the Gateway-to-Gateway tunnels, and then provides
procedures for configuring the tunnels.
Understanding Gateway-to-Gateway tunnels
You might want to make your network resources available to an outside group,
such as another office of the company. Instead of requiring each user on the
second network to establish their own, private secure connection, you can create
one Gateway-to-Gateway tunnel, which makes resources on each network
available to the other. This type of tunnel is LAN-to-LAN, instead of user-to-
LAN.
Table 6-3
User list fields
Field
Description
User Name
User name entered for the static VPN user.
Enable
Indicates whether a particular user can establish VPN
tunnels to the security gateway.
Pre-Shared Key
Displays the pre-shared key entered for the user.
VPN Group
Lists the VPN Groups for which a user is configured.