Cisco SA520-K9 Administration Guide - Page 149

Configuring VPN, Configuring Auto-Rollover, Load, Balancing, and Failure Detection, Dynamic

Page 149 highlights

Configuring VPN Advanced Configuration of IPsec VPN 7 STEP 2 To add a VPN policy, click Add. Other options: Click the Edit button to edit an entry. To delete an entry, check the box and then click Delete. To select all entries, check the box in the first column of the table heading. After you click Add or Edit, the VPN Policy Configuration window opens. STEP 3 In the General area, enter the following information: • Policy Name: Enter a unique name to identify the policy. • Policy Type: Choose one of the following types: - Auto: Some parameters for the VPN tunnel are generated automatically. The IKE (Internet Key Exchange) protocol is used to perform negotiations between the two VPN endpoints. To create an Auto VPN Policy, you need to first create an IKE policy and then add the corresponding Auto Policy for that IKE Policy. - Manual: All settings (including the keys) for the VPN tunnel are manually input for each end point. No third party server or organization is involved. • Select Local Gateway: If you configured the Optional Port for use as a WAN port, choose which WAN interface will act as one end of the tunnel: Dedicated WAN or Optional WAN. • Remote End Point: Choose to identify the remote end point by the IP address or the Internet Name/FQDN of the remote gateway or the client PC. Also enter the IP address or the Internet Name/FQDN in the field below the drop-down list. • Enable NetBIOS: Check this box to enable NetBIOS, which is a program that carries out name resolution. This option allows NetBIOS broadcasts to travel over the VPN tunnel. • Enable RollOver: This option is applicable if you have two ISP links and if you have enabled Auto-Rollover (see Configuring Auto-Rollover, Load Balancing, and Failure Detection, page 57). In this case, you can check the Enable RollOver box to ensure that VPN traffic rolls over to the backup link whenever the primary link fails. The security appliance will automatically update the local WAN gateway for the tunnel based on the optional WAN link configuration. For this type of configuration, Dynamic DNS has to be configured because the IP address will change due to failover. See Dynamic DNS, page 76. Cisco SA500 Series Security Appliances Administration Guide 149

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Configuring VPN
Advanced Configuration of IPsec VPN
Cisco SA500 Series Security Appliances Administration Guide
149
7
STEP 2
To add a VPN policy, click
Add
.
Other options:
Click the
Edit
button to edit an entry. To delete an entry, check the
box and then click
Delete
. To select all entries, check the box in the first column of
the table heading.
After you click Add or Edit, the VPN Policy Configuration window opens.
STEP 3
In the
General
area, enter the following information:
Policy Name:
Enter a unique name to identify the policy.
Policy Type:
Choose one of the following types:
-
Auto:
Some parameters for the VPN tunnel are generated automatically.
The IKE (Internet Key Exchange) protocol is used to perform negotiations
between the two VPN endpoints. To create an Auto VPN Policy, you need
to first create an IKE policy and then add the corresponding Auto Policy
for that IKE Policy.
-
Manual:
All settings (including the keys) for the VPN tunnel are manually
input for each end point. No third party server or organization is involved.
Select Local Gateway:
If you configured the Optional Port for use as a WAN
port, choose which WAN interface will act as one end of the tunnel:
Dedicated WAN
or
Optional WAN
.
Remote End Point:
Choose to identify the remote end point by the IP
address or the Internet Name/FQDN of the remote gateway or the client PC.
Also enter the IP address or the Internet Name/FQDN in the field below the
drop-down list.
Enable NetBIOS:
Check this box to enable NetBIOS, which is a program that
carries out name resolution. This option allows NetBIOS broadcasts to travel
over the VPN tunnel.
Enable RollOver:
This option is applicable if you have two ISP links and if
you have enabled Auto-Rollover (see
Configuring Auto-Rollover, Load
Balancing, and Failure Detection, page 57
). In this case, you can check the
Enable RollOver
box to ensure that VPN traffic rolls over to the backup link
whenever the primary link fails. The security appliance will automatically
update the local WAN gateway for the tunnel based on the optional WAN link
configuration. For this type of configuration, Dynamic DNS has to be
configured because the IP address will change due to failover. See
Dynamic
DNS, page 76
.