ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Virtual Private Networking Using IPsec Connections
7-21
v1.0, September 2009
Managing IPsec VPN Policies
After you have used the VPN Wizard to set up a VPN tunnel, a VPN policy and an IKE policy are
stored in separate policy tables. The name that you selected as the VPN tunnel connection name
during the VPN Wizard setup identifies both the VPN policy and IKE policy. You can edit existing
policies, or manually add new VPN and IKE policies directly in the policy tables.
Figure 7-19