Cisco ESW-540-48 Administration Guide - Page 148

Configuring the IPsec VPN Policies, Configuring the User Database for the IPsec Remote

Page 148 highlights

Configuring VPN Advanced Configuration of IPsec VPN 7 STEP 8 Click Apply to save your settings. NOTE Next Steps • To review or update the configured VPN policy click IPsec > VPN Policies. For more information, see Configuring the IPsec VPN Policies, page 148. • To review or update the configured IKE policy, click IPsec > IKE Policies. For more information, see Configuring the IKE Policies for IPsec VPN, page 144. • To configure IPsec passthrough, click IPsec > Passthrough. For more information, see Configuring IPsec Passthrough, page 153. • To configure the VPN users (for remote access VPN only), click IPsec > IPsec Users. See Configuring the User Database for the IPsec Remote Access VPN, page 142. • To configure the security appliance to work with your RADIUS server, see Configuring RADIUS Server Records, page 193. Configuring the IPsec VPN Policies You can use this page to manage the VPN policies. This page contains two tables List of VPN Policies and List of back up Policies. These tables list the policies that have been added and allows several operations on the policies. NOTE Before you create an Auto Policy, first create an IKE policy. Then you can apply the IKE policy on this page. For more information, see Configuring the IKE Policies for IPsec VPN, page 144. STEP 1 Click VPN > IPsec > VPN Policies. The VPN Policies window opens. Two tables are displayed: • List of VPN Policies: Lists all the VPN policies except the backup policies. Auto and Manual policies are included. • List of back up Policies: Lists all the policies that are configured as a backup policy. These policies are created when you create a new IKE policy and select the Enable Redundant Gateway option. The policy comes into effect only if the primary policy fails. You cannot enable, disable, edit, or delete the backup policies. You can only take actions on the primary policy, by using the buttons in the List of VPN Policies table. Cisco SA500 Series Security Appliances Administration Guide 148

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Configuring VPN
Advanced Configuration of IPsec VPN
Cisco SA500 Series Security Appliances Administration Guide
148
7
STEP
8
Click
Apply
to save your settings.
NOTE
Next Steps
To review or update the configured VPN policy click
IPsec > VPN Policies
.
For more information, see
Configuring the IPsec VPN Policies, page148
.
To review or update the configured IKE policy, click
IPsec > IKE Policies
.
For more information, see
Configuring the IKE Policies for IPsec VPN,
page 144
.
To configure IPsec passthrough, click
IPsec > Passthrough
. For more
information, see
Configuring IPsec Passthrough, page153
.
To configure the VPN users (for remote access VPN only), click
IPsec >
IPsec Users
. See
Configuring the User Database for the IPsec Remote
Access VPN, page 142
.
To configure the security appliance to work with your RADIUS server, see
Configuring RADIUS Server Records, page193
.
Configuring the IPsec VPN Policies
You can use this page to manage the VPN policies. This page contains two tables
List of VPN Policies and List of back up Policies. These tables list the policies that
have been added and allows several operations on the policies.
NOTE
Before you create an Auto Policy, first create an IKE policy. Then you can apply the
IKE policy on this page. For more information, see
Configuring the IKE Policies for
IPsec VPN, page 144
.
STEP 1
Click
VPN
> IPsec > VPN Policies
.
The VPN Policies window opens. Two tables are displayed:
List of VPN Policies:
Lists all the VPN policies except the backup policies.
Auto and Manual policies are included.
List of back up Policies:
Lists all the policies that are configured as a backup
policy. These policies are created when you create a new IKE policy and
select the
Enable Redundant Gateway
option. The policy comes into effect
only if the primary policy fails. You cannot enable, disable, edit, or delete the
backup policies. You can only take actions on the primary policy, by using the
buttons in the List of VPN Policies table.