
OfficeConnect VPN Firewall User’s Manual Chapter 14. Configuring IPSec VPN
83
14 Configuring IPSec VPN
OfficeConnect Gigabit VPN Firewall provides secure, encrypted communication
to business partners and remote offices at a fraction of the cost of dedicated
leased lines. Using the OfficeConnect Gigabit VPN Firewall Configuration
Manager, you can quickly create a VPN policy to a remote site. Whenever data
is intended for the remote site, the OfficeConnect Gigabit VPN Firewall
automatically encrypts the data and sends it over the Internet to the remote site,
where it is decrypted and forwarded to the intended destination.
The chapter contains instructions for configuring VPN connections using
automatic keying and manual keys.
14.1 VPN Tunnel Configuration Parameters
Table 14.1 describes all the VPN tunnel configuration parameters available for
various VPN configurations.
Table 14.1. VPN Tunnel Configuration Parameter
Enter a unique name, preferably a meaningful name
that signifies the tunnel connection. Note that only
alphanumeric characters are allowed in this field.
Select ―Auto‖ for automatic keying such as IKEv1 or
IKEv2. Otherwise, select ―Manual‖ for manual keying.
Select ―Tunnel‖ mode if you want to create a site-to-
site VPN tunnel. If you want to use L2TP over IPSec, a
Transport mode setting is required.
This option allows you to setup IPSec policy for
L2TP/IPSec.
This option allows you to terminate the IPSec VPN
tunnel on a specific interface.
Local Site
This option allows you to set the local secure network to which this rule
should apply. This option allows you to apply this rule inclusively on all
computers in the internal network. Use the ―Type‖ drop-down list to select
one of the following:
Select this option to accept connection request from
any computer.
This option allows you to include all the computers that
are connected in an IP subnet. The following fields
become available when this option is selected:
Specify the appropriate network address.
Remote Site
This option allows you to set the remote (destination) secure network to
which this rule should apply. This option allows you to apply this rule
inclusively on all computers in the external network. Use the ―Type‖ drop-
down list to select one of the following:
Select this option to accept connection request from
Commentaires sur ces manuels