Symantec 360R Administration Guide - Page 95

Enable VPN Tunnel, VPN Tunnel.

Page 95 highlights

Establishing secure VPN connections 95 Configuring Gateway-to-Gateway tunnels Table 6-7 Static Gateway-to-Gateway configuration tasks Task SGMI Define the remote security gateway Repeat the previous steps for the remote security gateway. VPN > Static Tunnels > Remote Security Gateway To add a static Gateway-to-Gateway tunnel See "Static Tunnels tab field descriptions" on page 193. 1 In the SGMI, in the left pane, click VPN. 2 In the right pane, on the Static Tunnels tab, under IPsec Security Association, in the Tunnel Name text box, type a name for the tunnel. To edit an existing static tunnel, on the VPN Tunnel drop-down list, select a VPN Tunnel. 3 Check Enable VPN Tunnel. 4 If you have a multi-session PPPoE ISP account, under Local Security Gateway, in the PPPoE Session drop-down list, select a PPPoE session to which you want to bind to the tunnel. If you do not have a multi-session PPPoE ISP account, skip this step. 5 For model 360 and 360R, on the Local Endpoint drop-down list, select the endpoint for the tunnel. 6 In the Incoming SPI text box, type the incoming SPI to match the remote SPI. 7 In the Outgoing SPI text box, type the outgoing SPI to match the local SPI from the remote side. 8 On the VPN Policy drop-down list, select a VPN policy to which you want to bind to the tunnel. Use an existing VPN policy or create a new one. See "Understanding VPN policies" on page 82. 9 In the Encryption Key text box, type the encryption key to match the chosen VPN policy. Entry length must match the chosen VPN policy. 10 In the Authentication Key text box, type the authentication key to match the chosen VPN policy. 11 Under Remote Security Gateway, in the Gateway Address text box, type the gateway address to be the gateway address of the Symantec Enterprise VPN.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

95
Establishing secure VPN connections
Configuring Gateway-to-Gateway tunnels
To add a static Gateway-to-Gateway tunnel
See
“Static Tunnels tab field descriptions”
on page 193.
1
In the SGMI, in the left pane, click
VPN
.
2
In the right pane, on the Static Tunnels tab, under IPsec Security
Association, in the Tunnel Name text box, type a name for the tunnel.
To edit an existing static tunnel, on the VPN Tunnel drop-down list, select a
VPN Tunnel.
3
Check
Enable VPN Tunnel
.
4
If you have a multi-session PPPoE ISP account, under Local Security
Gateway, in the PPPoE Session drop-down list, select a PPPoE session to
which you want to bind to the tunnel. If you do not have a multi-session
PPPoE ISP account, skip this step.
5
For model 360 and 360R, on the Local Endpoint drop-down list, select the
endpoint for the tunnel.
6
In the Incoming SPI text box, type the incoming SPI to match the remote
SPI.
7
In the Outgoing SPI text box, type the outgoing SPI to match the local SPI
from the remote side.
8
On the VPN Policy drop-down list, select a VPN policy to which you want to
bind to the tunnel.
Use an existing VPN policy or create a new one.
See
“Understanding VPN policies”
on page 82.
9
In the Encryption Key text box, type the encryption key to match the chosen
VPN policy.
Entry length must match the chosen VPN policy.
10
In the Authentication Key text box, type the authentication key to match the
chosen VPN policy.
11
Under Remote Security Gateway, in the Gateway Address text box, type the
gateway address to be the gateway address of the Symantec Enterprise VPN.
Define the remote security gateway
VPN > Static Tunnels > Remote
Security Gateway
Repeat the previous steps for the remote
security gateway.
Table 6-7
Static Gateway-to-Gateway configuration tasks
Task
SGMI