Creating a VPN Tunnel to a SOHO 6 with an IPSec-Compliant Appliance
Creating a VPN Tunnel to a SOHO 6 with an
IPSec-Compliant Appliance
Instructions that tell how to configure a VPN tunnel between a
SOHO 6 and another IPSec-compatible appliance are available
from the WatchGuard Web site:
https://www.watchguard.com/support/AdvancedFaqs/sointerop_main.asp
Special considerations
Think about these points before you configure your WatchGuard
SOHO 6 VPN network:
• You can connect a maximum of six SOHO 6 appliances
together in a star configuration. To configure more VPN
tunnels, a WatchGuard Firebox II/III with WatchGuard VPN
Manager is necessary.
• WatchGuard reccomends that both of the VPN appliances have
a static IP address. Configuring a VPN tunnel between two
appliances using dynamic IP addresses, can pose several
problems. See "Network addressing" on page 31 for more
information about dynamic IP addresses. However, these
issues can be resolved by using Dynamic DNS. For
information on configuring the Dynamic DNS feature, see
"Configuring the Dynamic DNS Service" on page 42.
• Both appliances must use the same encryption method; either
DES or 3DES.
• When two Microsoft Windows NT networks are connected, the
two networks must be in the same Microsoft Windows domain
or be trusted domains. This is a Microsoft Networking design
implementation and not a limitation of the SOHO 6.
User Guide
99
Need help?
Do you have a question about the Firebox SOHO 6 and is the answer not in the manual?
Questions and answers