Viewing VPN Policies List
Identifying users
6
In the SA Lifetime text box, type the number of minutes you want the
security association to stay alive before a rekey occurs.
The VPN tunnel is temporarily interrupted when rekeys occur.
7
In the Data Volume Limit text box, type the number of kilobytes of traffic to
allow before a rekey occurs.
8
In the Inactivity Timeout text box, type the number of minutes of inactivity
before a rekey occurs.
9
To use Perfect Forward Secrecy, do the following:
On the Perfect Forward Secrecy drop-down list, select a Diffie-Hellman
■
group.
Next to Perfect Forward Secrecy, click Enable.
■
10 Click Add.
The VPN Policies List section of the VPN Policies window displays a summary of
each VPN Policy that is configured on the appliance.
in the VPN Policies List summary.
Table 6-2
VPN Policies List fields
Field
Name
Encryption Method
SA Lifetime
Data Volume Limit
Inactivity Timeout
PFS
The appliance lets you configure two types of clients that use VPN: users and
users with extended authentication.
Establishing secure VPN connections
Description
Displays the name of the VPN Policy.
Displays the encryption method selected for the VPN
Policy.
Displays the configured SA Lifetime setting.
Displays the configured Data Volume Limit setting.
Displays the configured inactivity timeout setting.
Shows the Perfect Forward Secrecy setting.
Identifying users
Table 6-2
defines each field
85