SonicWALL none User Manual

Page of 66
 Adding VPN Connection Policies Page 15
5.
If you selected Remote Access in the Choose Scenario page, the Remote Access page is 
displayed. Type the IP address or FQDN of the gateway in the IP Address or Domain Name field. 
The information you type in the IP Address or Domain Name field appears in the Connection Name 
field. If you want a different name for your connection, type the new name for your VPN connection 
policy in the Connection Name field. Click Next. The Completing the New Connection Wizard 
page is displayed. 
6.
If you selected Office Gateway in the Choose Scenario page, the Completing the New Connection 
Wizard 
page is displayed.
7.
In the Completing the New Connection Wizard page select any of the following options:
Select Enable this connection when the program is launched, if you want to automatically 
establish this VPN connection when you launch the SonicWALL Global VPN Client. 
Select Create a shortcut to this connection on the desktop, if you want to create a shortcut icon 
on your desktop for this VPN connection.
8.
Click Finish. The new VPN connection policy appears in the SonicWALL Global VPN Client window. 
Note! You can change the default name by right-clicking the Office Gateway entry and selecting 
Properties from the menu. In the General tab of the Properties dialog box, enter the new name in the 
Name field.
Importing a VPN Configuration File
A VPN connection policy can be created as a file and sent to you by the SonicWALL VPN gateway 
administrator. This VPN configuration file has the filename extension .rcf. If you received a VPN 
connection policy file from your administrator, you can install it using the Import Connection dialog box.
The VPN policy file is in the XML format to provide more efficient encoding of policy information. Because 
the file can be encrypted, pre-shared keys can also be exported in the file. The encryption method is 
specified in the PKCS#5 Password-Based Cryptography Standard from RSA Laboratories and uses 
Triple-DES encryption and SHA-1 message digest algorithms.