SonicWALL 5.8.1 Manuale Utente

Pagina di 1490
VPN > Settings
896
SonicOS 5.8.1 Administrator Guide
  •
To manage the local SonicWALL through the VPN tunnel, select HTTPHTTPS, or 
both from Management via this SA. Select HTTPHTTPS, or both in the User login 
via this SA to allow users to login using the SA.
  •
Enter the Default LAN Gateway if you have more than one gateway and you want 
this one always to be used first. 
  •
Select an interface or zone from the VPN Policy bound to menu. A Zone WAN is 
the preferred selection if you are using WAN Load Balancing and you wish to allow 
the VPN to use either WAN interface. 
  •
Under IKEv2 Settings (visible only if you selected IKEv2 for Exchange on the 
Proposals tab), The Do not send trigger packet during IKE SA negotiation 
checkbox is cleared by default and should only be selected when required for 
interoperability. 
The term Trigger Packet refers to the use of initial Traffic Selector payloads populated 
with the IP addresses from the packet that caused SA negotiation to begin. It is 
recommended practice to include Trigger Packets to assist the IKEv2 Responder in 
selecting the correct protected IP address ranges from its Security Policy Database. 
Not all implementations support this feature, so it may be appropriate to disable the 
inclusion of Trigger Packets to some IKE peers. 
Step 15
Click OK.
Configuring a VPN Policy using Manual Key
To manually configure a VPN policy between two SonicWALL appliances using Manual Key, 
follow the steps below:
Configuring the Local SonicWALL Security Appliance
Step 1
Click Add on the VPN > Settings page. The VPN Policy window is displayed. 
Step 2
In the General tab of the VPN Policy window, select Manual Key from the IPsec Keying Mode 
menu. The VPN Policy window displays the manual key options.
Step 3
Enter a name for the policy in the Name field. 
Step 4
Enter the host name or IP address of the remote connection in the IPsec Gateway Name or 
Address
 field.