Viewing Vpn Policies List; Identifying Users - Symantec 360R - Security Gateway SGS Administration Manual

Gateway security 300 series
Hide thumbs Also See for 360R - Security Gateway SGS:
Table of Contents

Advertisement

Viewing VPN Policies List

Identifying users

6
In the SA Lifetime text box, type the number of minutes you want the
security association to stay alive before a rekey occurs.
The VPN tunnel is temporarily interrupted when rekeys occur.
7
In the Data Volume Limit text box, type the number of kilobytes of traffic to
allow before a rekey occurs.
8
In the Inactivity Timeout text box, type the number of minutes of inactivity
before a rekey occurs.
9
To use Perfect Forward Secrecy, do the following:
On the Perfect Forward Secrecy drop-down list, select a Diffie-Hellman
group.
Next to Perfect Forward Secrecy, click Enable.
10 Click Add.
The VPN Policies List section of the VPN Policies window displays a summary of
each VPN Policy that is configured on the appliance.
in the VPN Policies List summary.
Table 6-2
VPN Policies List fields
Field
Name
Encryption Method
SA Lifetime
Data Volume Limit
Inactivity Timeout
PFS
The appliance lets you configure two types of clients that use VPN: users and
users with extended authentication.
Establishing secure VPN connections
Description
Displays the name of the VPN Policy.
Displays the encryption method selected for the VPN
Policy.
Displays the configured SA Lifetime setting.
Displays the configured Data Volume Limit setting.
Displays the configured inactivity timeout setting.
Shows the Perfect Forward Secrecy setting.
Identifying users
Table 6-2
defines each field
85

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

320360

Table of Contents