Virtual Private Networking Using IPSec and L2TP Connections
226
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Figure 139.
Each policy contains the data that are explained in the following table. These fields are
explained in more detail in
Table 53
on page 230.
To delete one or more VPN polices:
1.
Select the check box to the left of each policy that you want to delete, or click the
Select
All
table button to select all VPN policies.
2.
Click the
Delete
table button.
Table 52.
VPN Policies screen information for IPv4 and IPv6
Item
Description
! (Status)
Indicates whether the policy is enabled (green circle) or disabled (gray circle). To enable
or disable a policy, select the check box adjacent to the circle, and click the
Enable
or
Disable
table button, as appropriate.
Name
The name that identifies the VPN policy. When you use the VPN Wizard to create a VPN
policy, the name of the VPN policy (and of the automatically created accompanying IKE
policy) is the connection name.
Type
Auto or Manual as described previously (Auto is used during VPN Wizard configuration).
Local
IP address (either a single address, range of address, or subnet address) on your LAN.
Traffic needs to be from (or to) these addresses to be covered by this policy. (The subnet
address is supplied as the default IP address when you are using the VPN Wizard.)
Remote
IP address or address range of the remote network. Traffic needs to be to (or from) these
addresses to be covered by this policy. (The VPN Wizard default requires the remote
LAN IP address and subnet mask.)
Auth
The authentication algorithm that is used for the VPN tunnel. This setting needs to match
the setting on the remote endpoint.
Encr
The encryption algorithm that is used for the VPN tunnel. This setting needs to match the
setting on the remote endpoint.