18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 14: Configuring Virtual Private Networks<br />

Example VPN Scenarios<br />

456<br />

b On the Authentication tab:<br />

• Authentication method = Single Certificate<br />

• Firewall Certificate = Select the certificate you created in step 1A<br />

• Remote Certificate = Select the certificate you created in step 1C for<br />

this client<br />

c On the Crypto tab: Order the algorithms to match that <strong>of</strong> the client<br />

d On the Advanced tab: No changes needed<br />

e Click Add to save the new VPN association.<br />

f Click the Save icon to save your changes.<br />

4 Repeat step 3 for each client, changing the name in step 3A and the remote<br />

certificate in step 3B as appropriate.<br />

Summary<br />

Each individual VPN connection can be used as soon as the remote clients are<br />

configured. Each client will need the client-specific certificate and private key<br />

information you saved in steps 1B and 1C in order to configure their end <strong>of</strong> the<br />

VPN connection. If you saved this information to diskette you can either hand it<br />

to them in person, mail it to them, or perform the imports while the machine is<br />

within a trusted network. It is not safe to distribute certificate and private key<br />

information via e-mail.<br />

Note: The configuration described above restricts VPN traffic by terminating it in a<br />

virtual burb. Proxies and rule entries must be configured to specify what access the<br />

VPN clients have to the trusted network.<br />

Scenario 3: Large scale deployment <strong>of</strong> clients<br />

This scenario is similar to Scenario 2 except that instead <strong>of</strong> a small number <strong>of</strong><br />

remote clients it assumes you have hundreds or even thousands <strong>of</strong> remote<br />

clients. Because it is unreasonable to create a unique VPN association for<br />

each client, a Certificate Authority (CA) will be used. The CA, in conjunction<br />

with the remote identities you define, allows you to create one VPN that is<br />

accessible by all <strong>of</strong> the clients.<br />

The following figure provides the sample configuration information used in this<br />

scenario.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!