Virtual Private Networks (VPN)
19. Click to expand Policies.
Policies define the network traffic that will be encapsulated by this tunnel.
a. Click to create a new policy.
The new policy configuration is displayed.
b. Click to expand Local network.
c. For Type, select one of the following:
n
n
n
n
d. For Remote network, enter the IP address and optional netmask of the remote network.
The keyword any can also be used. .
IX20 User Guide
For FQDN ID value, type the ID as an FQDN.
KeyID: The ID will be interpreted as a Key ID and sent as an ID_KEY_ID IKE
n
identity.
For KEYID ID value, type the key ID.
MAC address: The device's primary MAC address will be used as the ID and
n
sent as a ID_KEY_ID IKE identity.
Serial number: The device's serial number will be used as the ID and sent as a
n
ID_KEY_ID IKE identity.
Address: The address of a local network interface.
For Address, select the appropriate interface.
Network: The subnet of a local network interface.
For Address, select the appropriate interface.
Custom network: A user-defined network.
For Custom network, enter the IPv4 address and optional netmask. The keyword
any can also be used.
Request a network: Requests a network from the remote peer.
IPsec
297