18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Entering Certificate<br />

+ Certificate<br />

Authority<br />

information on the<br />

Authentication tab<br />

Chapter 14: Configuring Virtual Private Networks<br />

Configuring VPN Security Associations<br />

The Certificate + Certificate Authority tabs in the Authentication window are<br />

used to define certificate and certificate authority authentication for this VPN<br />

association. This means each peer must be validated using certificates and<br />

remote identities before entering into this VPN association. To configure the<br />

certificate and certificate authority tabs, follow the steps below.<br />

1 Select the Firewall Credentials sub-tab.<br />

2 In the Firewall Certificate drop-down list, select the certificate that will be<br />

used to identify the <strong>Sidewinder</strong> <strong>G2</strong> to the remote peer. You can also click<br />

the Firewall Certificates button to go to the Firewall Certificates window.<br />

This is useful if you want to use a certificate that has yet to be created.<br />

3 In the Firewall Identity Type field, select the type <strong>of</strong> identity to use when<br />

identifying the <strong>Sidewinder</strong> <strong>G2</strong> to the remote client. Only those identities<br />

defined within the selected firewall certificate will be available in this field<br />

Valid options are:<br />

• E-Mail<br />

• Fully Qualified Domain Name<br />

• IP Address<br />

• Distinguished Name<br />

The Value field contains the actual value used as the <strong>Sidewinder</strong> <strong>G2</strong> identity.<br />

This value is filled-in automatically using the information from the<br />

selected certificate. The field cannot be edited.<br />

4 [Conditional] Select the Require Extended Authentication check box if you<br />

want to use Extended Authentication. This check box is available only if an<br />

authentication method is configured for the ISAKMP server. See “Extended<br />

Authentication for VPN” on page 399 for more information on extended<br />

authentication.<br />

5 Select the Remote Credentials sub-tab.<br />

6 In the list <strong>of</strong> Available Certificate Authorities, select a CA you want to add<br />

as a trusted CA and click the ==>> button to add the CA to the Trusted List.<br />

You can add several trusted CAs. To select a CA that has yet to be defined,<br />

click the Cert Authorities button to go to the Certificate Authorities window.<br />

In this window you can define the needed CA, and then return here.<br />

7 In the list <strong>of</strong> Available Remote Identities, select a remote identity you want<br />

to add to the Trusted identity list and click the ==>> button. You can add<br />

several trusted remote identities. To select an identity that has yet to be<br />

defined, click Remote Identities to go to the Remote Identities window. This<br />

window allows you to define the needed identity, and then return here.<br />

8 Complete this tab by doing one <strong>of</strong> the following:<br />

• If you intend to change the Crypto or Advanced tab settings, go directly<br />

to the next tab without clicking Add or Close.<br />

• If you do not intend to change the Crypto or Advanced tab settings, click<br />

Add and then click Close. Click the Save icon to save your changes.<br />

• If you do not want to save this Security Association entry, click Close<br />

without clicking Add.<br />

445

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!