Configuration | Policy Management | Traffic Management | Rules | Delete
13-19
VPN 3000 Concentrator Series User Guide
Configuration | Policy Management | Traffic Management | Rules | Delete
This screen asks you to confirm deletion of a rule that is being used in a filter. Doing so deletes the rule
from all filters that use it, and deletes it from the VPN Concentrator active configuration. To remove a
rule from a filter but retain it in the active configuration, see the Configuration | Policy Management | Traffic
Management | Assign Rules to Filter screen.
Figure 13-9: Configuration | Policy Management | Traffic Management | Rules | Delete screen
Note: The Manager deletes the rule from the filter as soon as you click Yes. If this rule is being used by an
active filter, deletion may affect data traffic.
Yes / No
To delete this rule from all filters that use it, and delete it from the active configuration, click Yes. There
is no undo. The Manager returns to the Configuration | Policy Management | Traffic Management | Rules
screen and shows the remaining rules in the Filter Rules list.
Reminder: To save the active configuration and make it the boot configuration, click the Save Needed icon at the
top of the Manager window.
To not delete this rule, click No. The Manager returns to the Configuration | Policy Management | Traffic
Management | Rules screen, and the Filter Rules list is unchanged.
Configuration | Policy Management | Traffic Management | Security Associations
This section of the Manager lets you add, configure, modify, and delete Security Associations (SAs).
SAs apply only to IPSec tunnels. During tunnel establishment the two parties negotiate Security
Associations that govern authentication, encryption, encapsulatio n, key management, etc. In other
words, while rules and filters specify what traffic to manage, SAs tell how to do it.
IPSec configurations actually involve two SA negotiation phases: first, to establish the tunnel (the IKE
SA); and second, to govern traffic withinthe use ofthe tunnel (the IPSec SA). You must configure
IKE proposals before configuring Security Associations. See Configuration | System | Tunneling Protocols |
IPSec | IKE Proposals, or click the IKE Proposals link on this screen.