User Guide xxix
VPN to other IPSec compliant devices ...........................305
About VPN Policies ......................................................305
VPN policies and IPSec actions ....................................305
Using Authentication and Encryption .............................306
Defining an IKE Policy ..................................................307
Defining an IKE action ................................................310
Defining a VPN Security Policy ......................................314
Defining an IPSec action .............................................315
Using Tunnel Switching .................................................323
Enabling tunnel switching ...........................................326
CHAPTER 12 Creating a Remote User VPN Policy ....327
About Remote User VPN ..............................................328
Configuring the Remote Users Authentication Policy ......328
Using an internal authentication database ......................333
Using a RADIUS authentication database .......................335
Editing and deleting a user group profile .......................337
Removing the backup server ........................................338
Defining an IKE Policy and IKE Action ............................339
Defining an IKE action for RUVPN .................................339
Defining an IKE policy ................................................341
Defining an RUVPN Security Policy and an IPSec Action ..343
Defining an IPSec action for RUVPN ..............................343
Defining a security policy for RUVPN .............................345
Controlling a remote user’s access privileges ..................348
Monitoring Remote User Activity ...................................348
CHAPTER 13 Using Alarm Manager ............................351
Alarm Definitions .........................................................352
Defining a single-condition alarm .................................354
Defining a multiple-condition alarm ..............................356
Managing alarm definitions .........................................359
Responding to an Alarm Notification .............................360
CHAPTER 14 Monitoring the Firebox Vclass ..............363
Using the Real-Time Monitor .........................................363
Defining probes ........................................................365