Contents vii
January 2005
Importing a Security Policy ..............................................................................5-19
How to Set Up a Gateway-to-Gateway VPN Configuration .......................................... 5-20
Procedure to Configure a Gateway-to-Gateway VPN Tunnel ................................5-21
VPN Tunnel Control ............... ... ... ................................................. ... ... .... ... ... ... ... .... ... ...5-26
Activating a VPN Tunnel ........................................................................................5-26
Start Using a VPN Tunnel to Activate It ...........................................................5-26
Using the VPN Status Page to Activate a VPN Tunnel ....................................5-26
Activate the VPN Tunnel by Pinging the Remote Endpoint .............................5-27
Verifying the Status of a VPN Tunnel .....................................................................5-29
Deactivating a VPN Tunnel ................ .... ................................................................5-30
Using the Policy Table on the VPN Policies Page to Deactivate a VPN Tunnel 5-30
Using the VPN Status Page to Deactivate a VPN Tunnel ............... ... ... ..........5-31
Deleting a VPN Tunnel ...........................................................................................5-32
Chapter 6
Advanced Virtual Private Networking
Overview of FVS318v3 Policy-Based VPN Configuration ..............................................6-1
Using Policies to Manage VPN Traffic .....................................................................6-2
Using Automatic Key Management .......................................................................... 6-2
IKE Policies’ Automatic Key and Authentication Management ................................6-3
VPN Policy Configuration for Auto Key Negotiation ................................................. 6-5
VPN Policy Configuration for Manual Key Exchange ...............................................6-9
Using Digital Certificates for IKE Auto-Policy Authentication .......................................6-13
Certificate Revocation List (CRL) ...........................................................................6-14
Walk-Through of Configuration Scenarios on the FVS318v3 .......................................6-14
VPN Consortium Scenario 1:
Gateway-to-Gateway with Preshared Secrets .......................................................6-15
FVS318v3 Scenario 1: FVS318v3 to Gateway B IKE and VPN Policies ...............6-16
How to Check VPN Connections ...........................................................................6-21
Testing the Gateway A FVS318v3 LAN and the Gateway B LAN ...................6-21
FVS318v3 Scenario 2: FVS318v3 to FVS318v3 with RSA Certificates .................6-22
Chapter 7
Maintenance
Viewing VPN Firewall Status Information .......................................................................7-1
Viewing a List of Attached Devices .................................................................................7-5
Upgrading the Firewall Software ....................................................................................7-5
Configuration File Management ...... ... ... ... .... ..................................................................7-7