Aggressive Keying Mode For An Ipsec Tunnel - McAfee SG310 Administration Manual

Utm firewall
Table of Contents

Advertisement

VPN menu features
IPSec Advanced Setup wizard
Figure 283 IPSec VPN — Phase 2 Settings page — x.509 authentication
Fill in the fields.
Indicate the Local Network and Remote Network values. This examples uses the predefined
a
Network of Port B for the Local Network, and 172.17.4.0/24 for the Remote Network. Click
Add. The pair appears in the Local and Remote Network list.
Leave the Key lifetime field at the default value.
b
Leave the Phase 2 Proposal at the default.
c
Leave Perfect Forward Secrecy enabled.
d
Leave the Diffie-Hellman Group at the default.
e
Click Finish. The tunnel is added to the Tunnel List pane, and the Status column indicates the current
8
status of the tunnel.

Aggressive keying mode for an IPSec tunnel

Use the aggressive mode for a less restrictive exchange of key mode. The example configuration presented
in this procedure is a connection from a local dynamic IP address to a remote static IP address.
From the VPN menu, click IPSec. The IPSec VPN Setup page appears.
1
Click Advanced. The Tunnel Settings page appears
2
Figure 284 Tunnel Settings page — Aggressive keying mode
Fill in the fields.
278
McAfee UTM Firewall 4.0.4 Administration Guide
(Figure
284).

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sg560Sg560uSg565Sg580

Table of Contents