Creating Custom Phase 2 Vpn Policies - Symantec 360R - Security Gateway SGS Administration Manual

Gateway security 300 series
Hide thumbs Also See for 360R - Security Gateway SGS:
Table of Contents

Advertisement

84 Establishing secure VPN connections
Creating security policies

Creating custom Phase 2 VPN policies

and then later associate them with multiple secure tunnels. You can select a pre-
defined policy, or you can create your own using the VPN Policies tab.
VPN policies group together common characteristics for tunnels, and allow
rapid setup of additional tunnels with the same characteristics. The security
gateway also includes a handful of commonly used VPN policies, for both static
and dynamic tunnels.
You can define more than one VPN policy, varying the components you select
for each one. If you do this, ensure that your naming conventions let you
distinguish between policies that use the same encapsulation mode. When you
are ready to create your secure tunnels, clearly defined naming conventions will
make selecting the correct VPN policy easier.
Note: You cannot delete pre-defined VPN policies.
VPN Policies are pre-configured for typical VPN setups. If you require
customized settings (for compatibility with 3rd party equipment, for example)
then you can create a custom Phase 2 Policy on the VPN Policies tab.
A VPN policy groups together common characteristics for VPN tunnels. Rather
than configuring data privacy, data integrity, and data compression algorithms
for every tunnel that you create, you can configure standard, reusable VPN
policies and apply them to multiple secure tunnels.
Note: Configuring a VPN policy is optional for dynamic tunnels.
To create a custom Phase 2 VPN policy
See
"VPN Policies tab field descriptions"
1
In the SGMI, in the left pane, click VPN.
2
In the right pane, on the VPN Policies tab, under IPsec Security Association
(Phase 2) Parameters, in the Name text box, type a name for the VPN policy.
3
To edit an existing policy, from the VPN Policy drop-down list, select a VPN
policy.
4
On the Data Integrity (Authentication) drop-down list, select an
authentication.
5
On the Data Confidentiality (Encryption) drop-down list, select an
encryption type.
on page 200.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

320360

Table of Contents