Secure Computing SG300 User Manual page 209

Secure computing sg
Hide thumbs Also See for SG300:
Table of Contents

Advertisement

Manual Keys establishes the tunnel using predetermined encryption and
authentication keys.
This authentication method is no longer widely used. It is not very secure as
changing keys requires user intervention, and consequently keys are not changed
very often. Using manual keys is not recommended.
In this example, select the Preshared Secret option.
Click the Next button to configure the Local Endpoint Settings.
Local endpoint settings
Leave the Initiate the tunnel from this end checkbox checked.
Note
This option is not be available when the SG unit has a static IP address and the remote
party has a dynamic IP address.
Enter the Required Endpoint ID of the SG unit. This ID is used to authenticate the SG
unit to the remote party. It is required because the SG unit in this example has a
dynamic IP address. This field is also required if RSA Digital Signatures are used for
authentication.
Virtual Private Networking
205

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SG300 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Sg530Sg550Sg560Sg570Sg575Sg580 ... Show all

Table of Contents