18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Understanding<br />

virtual burbs<br />

Chapter 14: Configuring Virtual Private Networks<br />

Understanding virtual burbs<br />

c In the LDAP Timeout field, specify the maximum time (in seconds) that<br />

CMD will wait while performing an LDAP search. The valid range is<br />

between 0 and 3600 seconds. The recommend value is between 5 and<br />

300 seconds.<br />

2 In the Maximum Validated Key Cache Size field, specify the maximum<br />

number <strong>of</strong> validated keys that will be stored in cache memory. Caching<br />

validated keys can increase system performance. Valid ranges are<br />

0–500. A value <strong>of</strong> 0 indicates that no keys will be cached. For most systems<br />

a value <strong>of</strong> 100 is sufficient.<br />

3 In the Certificate Key Cache Lifetime field, specify the maximum amount <strong>of</strong><br />

time a certificate can remain in the validated key cache before it must be revalidated.<br />

The valid range is 0–168 hours (1 week). A value <strong>of</strong> 0 indicates<br />

that the certificate keys must be re-validated with each use.<br />

4 Select the Perform CRL Checking check box to enable CRL checking. If<br />

this option is disabled, CRL lists will not be consulted when validating<br />

certificates.<br />

5 In the CRL Retrieval Interval for CAs drop-down list, specify how <strong>of</strong>ten a<br />

CA is queried in order to retrieve a new CRL.<br />

6 In the Audit Level drop-down list, select the type <strong>of</strong> auditing that should be<br />

performed on this server. The options are:<br />

• Error—Logs only major errors.<br />

• Normal—Logs only major errors and informational messages.<br />

• Verbose—Logs all errors and informational messages.<br />

• Debug—Logs all errors and informational messages. Also logs all<br />

debug information.<br />

• Trace—Logs all errors and informational messages. Logs all debug and<br />

function trace information.<br />

7 Click the Save icon in the toolbar.<br />

A virtual burb is a burb that does not contain a network interface card (NIC).<br />

The sole purpose <strong>of</strong> a virtual burb is to serve as a logical endpoint for a VPN<br />

association. Terminating a VPN association in a virtual burb accomplishes two<br />

important goals:<br />

• It separates VPN traffic from non-VPN traffic.<br />

• It enables you to enforce a security policy that applies strictly to your VPN<br />

users.<br />

Consider a VPN policy that is implemented without the use <strong>of</strong> a virtual burb.<br />

Not only will VPN traffic mix with non-VPN traffic, but there is no way to enforce<br />

a different set <strong>of</strong> rules for the VPN traffic. This is because proxies and rules are<br />

applied on burb basis, not to specific traffic within a burb. By terminating the<br />

VPN in a virtual burb you effectively isolate the VPN traffic from non-VPN<br />

traffic. Plus, you are able to configure a unique set <strong>of</strong> rules for the virtual burb<br />

405

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!