
Chapter 7 VPN
194 X Family LSM User’s Guide V 2.5.1
For details on configuring IPSec Security Associations, see the following topics:
• “IPSec Security Association Configuration Parameters” on page 190
• “Edit the Default SA for Client-to-Site VPN Connections using L2TP over IPSec” on page 194
• “Edit the Default SA for Site-to-Site VPN Connections” on page 197
• “Configure an IPSec SA for a Site-to-Site VPN Connection” on page 195
Edit the Default SA for Client-to-Site VPN Connections using L2TP over IPSec
STEP 1
From the LSM menu, select VPN > IPSec Status. Then, select the IPSec Configuration tab.
The VPN - IP Security/ IKE page displays.
STEP 2
On the IPSec Configuration page in the IP Security Associations table, click the Pencil icon to
for the Default SA entry.
STEP 3
On the Edit IP Security Association page, in the IP Security Association Setup table, check
Enable Security Association to enable the Default SA.
STEP 4
To enable the X family device to use the Default SA for L2TP VPNs, check Support L2TP.
L2TP uses IPSec transport mode.
STEP 5
For IKE Setup, select the IKE Proposal from the drop-down list of proposals currently con-
figured.
STEP 6
If you have selected an IKE Proposal with pre-shared key (PSK), type the Shared Secret.
The same pre-shared key or X.509 Certificate must be available on the remote device
establishing a VPN tunnel with the local device.
Enable NAT of local network
addresses
Enable this option to perform NAT on traffic entering a VPN tunnel.
Selecting this option allows multiple remote VPN sites can use the
same IP subnet.
If you enable NAT, enter the NAT IP Address. This address must be
included in the Local ID configured for the local network.
Only one NAT IP address can be used for outgoing sessions for one
VPN tunnel. However, you can configure an all-services Virtual
Server for other specific IP addresses. These servers will use the
virtual server public IP address for outgoing sessions when VPN
NAT is enabled. This provides one-to-one NAT capability within
VPN tunnels. For details, see “
Configuring Virtual Servers” on
page 84.
If you enable NAT for the VPN tunnel, the Terminated Security Zone
configured for the Security Association must be virtual, no physical
ports assigned to the zone.
Table 7–3: IPSec Security Association Configuration Parameters (Continued)
Parameter Description
Kommentare zu diesen Handbüchern