Check Point UTM-1 Edge User Manual page 552

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

Viewing VPN Tunnels
Table 111: VPN Tunnels Page Fields
This field...
Displays...
Type
The currently active security protocol (IPSEC).
Source
The IP address or address range of the entity from which the tunnel
originates.
The entity's type is indicated by an icon. See VPN Tunnel Icons on page
539.
Destination
The IP address or address range of the entity to which the tunnel is
connected.
The entity's type is indicated by an icon. See VPN Tunnel Icons on page
539.
Security
The type of encryption used to secure the connection, and the type of
Message Authentication Code (MAC) used to verify the integrity of the
message. This information is presented in the following format: Encryption
type/Authentication type.
In addition, if IPSec compression is enabled for the tunnel, this field displays
the
Note: All VPN settings are automatically negotiated between the two sites.
The encryption and authentication schemes used for the connection are the
strongest of those used at the two sites.
Your UTM-1 appliance supports AES, 3DES, and DES encryption schemes,
and MD5 and SHA authentication schemes.
538
icon.
Check Point UTM-1 Edge User Guide

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF