Fill in the Tunnel name field with your name for the tunnel. The name must not contain
spaces or start with a number. In this example, enter Headquarters.
Leave the Enable this tunnel checkbox checked.
Enter The remote party's IP address, which is the IP address of the remote party's
IPSec endpoint. For a remote party that has a dynamic IP address, click Predefined.
Enter the Local Network that will have access to the remote network. Either select from
a list of predefined values, which are based on the current network configuration, or you
can define custom networks.
Enter the Remote Network that the specified local network should have access to.
From the Authentication drop-down select one of the following:
Preshared Secret — this is a common secret (passphrase) that is shared
between the device and the remote party. Tunnels configured with this
method of authentication using the Quick Setup will by default use Aggressive
Mode.
X.509 Certificates — are are used to authenticate the remote party against a
Certificate Authority's (CA) certificate. The CA certificate must have signed the
local certificates that are used for tunnel authentication. Local and CA
Certificates need to be uploaded to the device before a tunnel can be
configured to use them. Tunnels configured with this method of authentication
using the Quick Setup will by default use Main Mode.
Enter the Local Endpoint ID using the form of an email to authenticate the device to the
remote party. For example: sg@local.com.
Enter the Remote Endpoint ID using the form of an email to authenticate the device to
the remote party. For example: sg@local.com.
Enter the Preshared Secret that will be used during negotiations. This secret should be
kept confidential.
Virtual Private Networking
213
Need help?
Do you have a question about the SG300 and is the answer not in the manual?
Questions and answers