Virtual Private Networking Using IPSec, PPTP, or L2TP Connections
301
ProSecure Unified Threat Management (UTM) Appliance
Figure 181.
Each policy contains the data that are explained in the following table. These fields are
explained in more detail in Table 74 on page 304.
Table 73. List of VPN Policies table information
Setting Description
! (Status) Indicates whether the policy is enabled (green circle) or disabled (gray circle). To enable
or disable a policy, select the check box next to the circle, and click the Enable or
Disable table button, as appropriate.
Name The name that identifies the VPN policy. When you use the VPN Wizard to create a VPN
policy, the name of the VPN policy (and of the automatically created accompanying IKE
policy) is the connection name.
Type Auto or Manual as described previously (Auto is used during VPN Wizard configuration).
Local IP address (either a single address, range of address, or subnet address) on your LAN.
Traffic needs to be from (or to) these addresses to be covered by this policy. (The subnet
address is supplied as the default IP address when you are using the VPN Wizard.)
Remote IP address or address range of the remote network. Traffic needs to be to (or from) these
addresses to be covered by this policy. (The VPN Wizard default requires the remote
LAN IP address and subnet mask.)
Auth The authentication algorithm that is used for the VPN tunnel. This setting needs to match
the setting on the remote endpoint.
Encr The encryption algorithm that is used for the VPN tunnel. This setting needs to match the
setting on the remote endpoint.