Watchguard Firebox X5-W Guía de usuario Pagina 178

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 234
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 177
Configuring the MUVPN Client
162 Firebox X Edge e-Series
Tips for Configuring the Pocket PC
WatchGuard® does not supply a Mobile User VPN software package for the Pocket PC platform. You
must use the software manufacturers instructions to configure their software and the Pocket PC.
The Firebox® X Edge e-Series allows only connections that use IPSec. The Edge does not support PPTP
VPN tunnels.
Here are some configuration tips for the Pocket PC.
Phase 1 configuration of the Pocket PC’s VPN software
The Pocket PCs “IPSec Peer Gateway Address” must be the Firebox X Edge external IP address if
the Pocket PC is connecting from the Internet.
The IPSec Peer Gateway Address must be the Edge’s private IP address if the Pocket PC is
connecting from the optional or trusted network.
The Phase 1 ID type must be “ID_USER_FQDN”.
This is known also as the IKE ID by some ISPs. The ID Type can also be known as the “Fully Qualified Username” or
“User Name.”
The Phase 1 ID must be the Firebox X Edge users name.
You must use Aggressive Mode, not Main Mode.
Extended authentication is not supported on the Firebox X Edge.
Certificates are not supported on the Firebox X Edge.
NAT Traversal is supported on the Firebox X Edge.
Some implementations of the protocol require that you disable NAT Traversal on the Pocket PC.
IKE-Config Mode is supported on the Firebox X Edge.
Some IPSec software providers call this IKE Mode-Configuration.
Phase 1 encryption type can be set to DES or 3DES. The Firebox X Edge uses DES as the default
encryption.
Phase 1 authentication type can be set to SHA1-HMAC or MD5-HMAC. The Firebox X Edge uses
SHA1-HMAC as the default authentication.
The Diffie-Hellman Group can be set to Group 1 or 2. The Firebox X Edge uses Group 1 as the
default value.
The Firebox X Edge accepts most Phase 1 time-out values.
Phase 2 configuration of the VPN
The encryption algorithm and the authentication algorithm are configured in the Firebox User
account settings, on the MUVPN tab.
The IPSec Phase 2 timeouts are configured in the Firebox User account settings, on the MUVPN
tab.
The remote user’s virtual IP address is configured in the Firebox User account settings, on the
MUVPN tab. The virtual IP address must be an IP address from the Edges trusted or optional
network that is not being used.
The Firebox X Edge does not support compression.
By default, the network that the Firebox X Edge allows encrypted traffic to is the trusted network.
The default trusted network is 192.168.111.0/24, or 192.168.111.0 with subnet mask
255.255.255.0.
If all traffic from the Pocket PC must flow through the VPN, select the check box All traffic uses
tunnel (0.0.0.0/0 IP Subnet) in the user’s MUVPN setup.
Vista de pagina 177
1 2 ... 173 174 175 176 177 178 179 180 181 182 183 ... 233 234

Comentarios a estos manuales

Sin comentarios