7
IPsec VPN
132
5. Mark
and
copy
into
the
system
clipboard
that
line
and
everything
under
it,
up
to
and
including
the
line:
‐‐‐‐‐
END
RSA
PRIVATE
KEY
‐‐‐‐
6. Now
paste
the
copied
text
into
the
.key
file
and
save
it.
7. Back
in
the
.pem
file,
locate
the
line
that
begins:
‐‐‐‐‐
BEGIN
CERTIFICATE
‐‐‐‐
and
copy
into
the
system
clipboard
that
line
and
everything
under
it,
up
to
and
including:
‐‐‐‐‐
END
CERTIFICATE
‐‐‐‐
8. Now
paste
this
copied
text
into
the
.cer
file
and
save
it.
The
saved
.key
and
.cer
files
are
now
ready
for
upload
into
the
SEG.
IPsec with the SEG
This
section
looks
more
closely
at
IPsec
tunnels
usage
with
the
SEG.
An
IPsecTunnel
object
in
the
SEG
defines
an
endpoint
of
an
encrypted
VPN
tunnel.
Each
IPsec
tunnel
is
interpreted
as
a
logical
interface
by
the
SEG,
with
the
same
filtering,
traffic
shaping
and
configuration
capabilities
as
a
physical
Ethernet
interfaces.
Remote initiation of tunnel establishment
When
another
security
gateway
or
another
IPsec
compliant
networking
product
(also
known
as
the
remote
endpoint
)
tries
to
establish
an
IPsec
VPN
tunnel
to
a
local
security
gateway,
the
list
of
currently
defined
IPsec
tunnels
in
the
SEG
configuration
is
examined.
If
a
matching
tunnel
definition
is
found,
that
tunnel
is
opened.
The
associated
IKE
and
IPsec
negotiations
then
take
place,
resulting
in
the
tunnel
becoming
established
to
the
remote
endpoint.
IP rules control decrypted traffic
Note
that
an
established
IPsec
tunnel
does
not
automatically
mean
that
all
the
traffic
flowing
from
the
tunnel
is
trusted.
On
the
contrary,
network
traffic
that
has
been
decrypted
will
be
checked
against
the
IP
rule
set.
When
doing
this
IP
rule
set
check,
the
source
interface
of
the
traffic
will
be
the
associated
IPsec
tunnel
since
tunnels
are
treated
like
interfaces
in
the
SEG.
Returning traffic
For
network
traffic
going
in
the
opposite
direction,
back
into
an
IPsec
tunnel,
a
reverse
process
takes
place.
First,
the
unencrypted
traffic
is
evaluated
by
the
rule
set.
If
a
rule
and
route
matches,
the
SEG
tries
to
find
an
established
IPsec
tunnel
that
matches
the
criteria.
If
not
found,
the
SEG
will
try
to
establish
a
new
tunnel
to
the
remote
endpoint
specified
by
a
matching
IPsec
tunnel
definition.
IPsec tunnels themselves do not require IP rules
By
default,
all
traffic
entering
and
leaving
an
SEG
IPsec
tunnel
is
subject
to
defined
IP
rules
so
those
must
be
defined
in
the
SEG
rule
sets
for
traffic
to
flow
inside
the
tunnel.