7 VPN

The VPN section provides an overview of Virtual Private Networks and describes how they are implemented.

Overview

The VPN menu pages in the LSM allow you to configure the protocol and authentication method for VPN tunnels so that remote users and devices can access the X family device. The following menu options are available:

IPSec Status — View and manage IPSec configuration for the X family device. This page also provides access to the IPSec Configuration page to enable and configure IPSec and to manage the IPSec Security Associations. Use this option when you are configuring a site-to-site VPN connection, or a client-to-site connection that relies on the IPSec or L2TP over IPSec tunneling protocol.

IKE Proposal — View, set up, and/or modify configuration for IKE phase 1 and phase 2. Use this option if you want to use IKE as the keying mode to negotiate an IPSec or L2TP over IPSec VPN connection.

L2TP Status — View current L2TP connections, configure the X family device to act as an L2TP server. Use this option for client-to-site connections that use L2TP or L2TP over IPSec.

PPTP Status — View current PPTP connections, configure the X family device to act as a PPTP server. Use this option for client-to-site connections to support remote users. The PPTP protocol is the least secure method for VPN connections.

Before using the available menu options, review the VPN chapter in the Concepts Guide.

X Family LSM User’s Guide V 2.5.1

181