Client Configuration |
Name
|
Name to identify the client configuration.
|
Enter a name.
|
IPSec VPN
|
IKE AutoKey configuration to use when establishing the VPN tunnel.
|
Select a previously created IKE AutoKey configuration.
|
Remote Address |
Remote Sources IP
|
IP address and netmask of a resource behind the firewall. Traffic
to the specified resource will go through the VPN tunnel and therefore
will be protected by the firewall’s security policies.
Note:
The device does not validate that the IP/netmask combination
that you enter here matches up with your security policies.
|
Enter an IP address and netmask and click Add.
|
Remote Exceptions IP
|
IP address and netmask of exceptions to the remote protected
resources list.
|
Enter an IP address and netmask and click Add.
|
Users |
Users
|
List of users that can use this client configuration.
Note:
The server does not validate the names that you enter here,
but the names must be the names that the users use to log onto the
device when downloading the client.
|
Enter a user name and click Add.
|