Page 106 / 176 Scroll up to view Page 101 - 105
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
5-28
Basic Virtual Private Networking
v1.0, September 2007
Page 107 / 176
Advanced Virtual Private Networking
6-1
v1.0, September 2007
Chapter 6
Advanced Virtual Private Networking
This chapter describes how to use the advanced virtual private networking (VPN) features of the
VPN firewall. See
Chapter 5, “Basic Virtual Private Networking
” for a description on how to use
the basic VPN features.
The FVG318 uses state-of-the-art firewall and security technology to facilitate controlled and
actively monitored VPN connectivity. Since the FVG318 strictly conforms to IETF standards, it is
interoperable with devices from major network equipment vendors.
Using IKE and VPN Policies to Manage VPN Traffic
You create policy definitions to manage VPN traffic on the FVG318. There are two kinds of
policies:
IKE Policies
. Define the authentication scheme and automatically generate the encryption
keys. As an alternative option, to further automate the process, you can create an IKE policy
that uses a trusted certificate authority to provide the authentication while the IKE policy still
handles the encryption.
Figure 6-1
FVG318 VPN Firewall
FVG318 VPN Firewall
Page 108 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
6-2
Advanced Virtual Private Networking
v1.0, September 2007
VPN Policies
. Apply the IKE policy to specific traffic that requires a VPN tunnel. Or, you can
create a VPN policy that does not use an IKE policy but in which you manually enter all the
authentication and key parameters.
Since VPN policies use IKE policies, you define the IKE policy first. The FVG318 also allows you
to manually input the authentication scheme and encryption key values. In the case of manual key
management there will not be any IKE policies.
In order to establish secure communication over the Internet with the remote site you need to
configure matching VPN policies on both the local and remote VPN firewalls. The outbound VPN
policy on one end must match to the inbound VPN policy on other end, and vice versa.
When the network traffic enters into the FVG318 from the LAN network interface, if there is no
VPN policy found for a type of network traffic, then that traffic passes through without any
change. However, if the traffic is selected by a VPN policy, then the IPSec authentication and
encryption rules are applied to it as defined in the VPN policy.
By default, a new VPN policy is added with the least priority, that is, at the end of the VPN policy
table.
Using Automatic Key Management
The most common configuration scenarios will use IKE policies to automatically manage the
authentication and encryption keys. Based on the IKE policy, some parameters for the VPN tunnel
are generated automatically. The IKE protocols perform negotiations between the two VPN
endpoints to automatically generate required parameters.
Some organizations will use an IKE policy with a Certificate Authority (CA) to perform
authentication. Typically, CA authentication is used in large organizations that maintain their own
internal CA server. This requires that each VPN gateway have a certificate from the CA. Using
CAs reduces the amount of data entry required on each VPN endpoint.
IKE Policy Automatic Key and Authentication Management
Click the
IKE Policies
tab from the VPN > Policies section of the main menu, and then click the
Add
button of the IKE Policies screen to display the IKE Policy Configuration menu shown in
Figure 6-2
.
Page 109 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Advanced Virtual Private Networking
6-3
v1.0, September 2007
The IKE Policy Configuration fields are defined in the following table.
VPN Policy Configuration for Auto Key and Manual Negotiation
Click the
Add New VPN Policy
link on the
Add IKE Policy
screen or select
VPN > Policies
and
click the
VPN Policies
tab to navigate to the VPN Policies configuration screen.
An already defined IKE policy is required for VPN Auto Policy configuration.
With Manual Key Management, you will not use an IKE policy. You must manually type in all
the required key information.
Figure 6-2
Click to create VPN policy.
Page 110 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
6-4
Advanced Virtual Private Networking
v1.0, September 2007
The VPN Manual and Auto Policy fields are defined in the following table.
Figure 6-3
Table 6-1.
VPN Manual and Auto Policy Configuration Fields
Field
Description
General
These settings identify this policy and determine its major characteristics.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top