EasyManua.ls Logo

Secure Computing SG300 - Page 245

Secure Computing SG300
341 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Keying: Aggressive mode (IKE)
Local address: Static IP address
Remote address: Dynamic IP address
Route to remote endpoint: Internet port's gateway
Remote required endpoint ID: primary@branch
Local network: 192.168.1.0/255.255.255.0
Remote network: 192.168.2.0/255.255.255.0
Branch office SG configuration:
Tunnel name: PrimaryLink
Enable this tunnel: Unchecked
Local interface: Default gateway interface
Keying: Aggressive mode (IKE)
Local optional endpoint ID: primary@branch
The remote party's IP address: 209.0.0.1
Local network: 192.168.2.0/255.255.255.0
Remote network: 192.168.1.0/255.255.255.0
Setup an IPSec tunnel between the secondary Internet IP Addresses (192.168.1.0/24 -
209.0.1.1 <> 210.0.1.1 – 192.168.2.0/24). Default values are used in the configuration
unless otherwise specified below:
Headquarters SG configuration:
Tunnel name: SecondaryLink
Local interface: Internet port
Keying: Aggressive mode (IKE)
Local address: Static IP address
Remote address: Dynamic IP address
Route to remote endpoint: DMZ port's gateway
Remote required endpoint ID: secondary@branch
Local network: 192.168.1.0/255.255.255.0
Remote network: 192.168.2.0/255.255.255.0
Branch Office SG configuration:
239
Virtual Private Networking

Table of Contents

Related product manuals