Contents vii
202-10098-01, April 2005
Procedure to Configure a Gateway-to-Gateway VPN Tunnel ................................ 5-21
VPN Tunnel Control ................................................................................................... ...5-26
Activating a VPN Tunnel . ....................................................................................... 5-26
Start Using a VPN Tunnel to Activate It ........................................................... 5-26
Using the VPN Status Page to Activate a VPN Tunnel ....................................5-26
Activate the VPN Tunnel by Pinging the Remote Endpoint ............................. 5-27
Verifying the Status of a VPN Tunnel ..................................................................... 5-29
Deactivating a VPN Tunnel ....................................... .............................................5-30
Using the Policy Table on the VPN Policies Page to Deactivate a VPN Tunnel 5-30
Using the VPN Status Page to Deactivate a VPN Tunnel .. ... .... ... ... ... ... .... ......5-31
Deleting a VPN Tunnel ........................................................................................... 5-32
Chapter 6
Advanced Virtual Private Networking
Overview of FVS114 Policy-Based VPN Configuration ..................................................6-1
Using Policies to Manage VPN Traffic .....................................................................6-2
Using Automatic Key Management .......................................................................... 6-2
IKE Policies’ Automatic Key and Authentication Management ........ ........................6-3
VPN Policy Configuration for Auto Key Negotiation .................................................6-5
VPN Policy Configuration for Manual Key Exchange ...............................................6-9
Using Digital Certificates for IKE Auto-Policy Authentication ....................................... 6-13
Certificate Revocation List (CRL) .............................................................. .............6-14
Walk-Through of Configuration Scenarios on the FVS114 ........................................... 6-14
VPN Consortium Scenario 1:
Gateway-to-Gateway with Preshared Secrets ... ....................................................6-15
FVS114 Scenario 1: FVS114 to Gateway B IKE and VPN Policies .......................6-16
How to Check VPN Connections ........................................................................... 6-21
Testing the Gateway A FVS114 LAN and the Gateway B LAN .......................6-21
FVS114 Scenario 2: FVS114 to FVS114 with RSA Certificates ............................. 6-22
Chapter 7
Maintenance
Viewing VPN Firewall Status Information ........................ ...............................................7-1
Viewing a List of Attached Devices ................................................................................. 7-5
Upgrading the Firewall Software ............................................................................... .....7-5
Configuration File Management ..................................................................................... 7-6
Backing Up the Configuration .................................................................................. 7-7
Restoring the Configuration ..................................................................................... 7-7