This chapter describes how to use the advanced virtual private networking (VPN) features of the
VPN firewall. See
Chapter 5, "Basic Virtual Private
the basic VPN features.
The FVG318 uses state-of-the-art firewall and security technology to facilitate controlled and
actively monitored VPN connectivity. Since the FVG318 strictly conforms to IETF standards, it is
interoperable with devices from major network equipment vendors.
FVG318 VPN Firewall
Figure 6-1
Using IKE and VPN Policies to Manage VPN Traffic
You create policy definitions to manage VPN traffic on the FVG318. There are two kinds of
policies:
•
IKE Policies. Define the authentication scheme and automatically generate the encryption
keys. As an alternative option, to further automate the process, you can create an IKE policy
that uses a trusted certificate authority to provide the authentication while the IKE policy still
handles the encryption.
Advanced Virtual Private Networking
Advanced Virtual Private Networking
v1.0, September 2007
Networking" for a description on how to use
FVG318 VPN Firewall
Chapter 6
6-1