Table 6-7
Static Gateway-to-Gateway configuration tasks
Task
Define the remote security gateway
Repeat the previous steps for the remote
security gateway.
To add a static Gateway-to-Gateway tunnel
See
"Static Tunnels tab field descriptions"
1
In the SGMI, in the left pane, click VPN.
2
In the right pane, on the Static Tunnels tab, under IPsec Security
Association, in the Tunnel Name text box, type a name for the tunnel.
To edit an existing static tunnel, on the VPN Tunnel drop-down list, select a
VPN Tunnel.
3
Check Enable VPN Tunnel.
4
If you have a multi-session PPPoE ISP account, under Local Security
Gateway, in the PPPoE Session drop-down list, select a PPPoE session to
which you want to bind to the tunnel. If you do not have a multi-session
PPPoE ISP account, skip this step.
5
For model 360 and 360R, on the Local Endpoint drop-down list, select the
endpoint for the tunnel.
6
In the Incoming SPI text box, type the incoming SPI to match the remote
SPI.
7
In the Outgoing SPI text box, type the outgoing SPI to match the local SPI
from the remote side.
8
On the VPN Policy drop-down list, select a VPN policy to which you want to
bind to the tunnel.
Use an existing VPN policy or create a new one.
See
"Understanding VPN policies"
9
In the Encryption Key text box, type the encryption key to match the chosen
VPN policy.
Entry length must match the chosen VPN policy.
10 In the Authentication Key text box, type the authentication key to match the
chosen VPN policy.
11 Under Remote Security Gateway, in the Gateway Address text box, type the
gateway address to be the gateway address of the Symantec Enterprise VPN.
Establishing secure VPN connections
Configuring Gateway-to-Gateway tunnels
SGMI
VPN > Static Tunnels > Remote
Security Gateway
on page 193.
on page 82.
95