18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 14: Configuring Virtual Private Networks<br />

Example VPN Scenarios<br />

When you are finished your storage location should have four items for<br />

each remote client: the CA certificate, the firewall certificate, the unique private<br />

key for the client, and the remote certificate for the client.<br />

Summary<br />

<strong>Sidewinder</strong> <strong>G2</strong> is ready to accept connections across this VPN as soon as the<br />

remote clients are configured. In order to configure their end <strong>of</strong> the VPN<br />

connection, each client will need the client-specific certificate and private key<br />

information you saved in step 4 as well as the firewall and CA certificates<br />

created in step 5. If you saved this information to diskette you can either<br />

distribute the information in person or mail it to them, or perform the imports<br />

while the machine is within a trusted network. It is not safe to distribute<br />

certificate and private key information via e-mail.<br />

Note: The configuration described above restricts VPN traffic by terminating the<br />

VPN association in a virtual burb. Proxies and rules must be configured to specify<br />

what access the VPN clients have to the trusted network.<br />

461

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!