User Guide
xxix
VPN to other IPSec compliant devices
...........................305
About VPN Policies
......................................................305
VPN policies and IPSec actions
....................................305
Using Authentication and Encryption
.............................306
Defining an IKE Policy
..................................................307
Defining an IKE action
................................................310
Defining a VPN Security Policy
......................................314
Defining an IPSec action
.............................................315
Using Tunnel Switching
.................................................323
Enabling tunnel switching
...........................................326
CHAPTER 12
Creating a Remote User VPN Policy
....327
About Remote User VPN
..............................................328
Configuring the Remote Users Authentication Policy
......328
Using an internal authentication database
......................333
Using a RADIUS authentication database
.......................335
Editing and deleting a user group profile
.......................337
Removing the backup server
........................................338
Defining an IKE Policy and IKE Action
............................339
Defining an IKE action for RUVPN
.................................339
Defining an IKE policy
................................................341
Defining an RUVPN Security Policy and an IPSec Action
..343
Defining an IPSec action for RUVPN
..............................343
Defining a security policy for RUVPN
.............................345
Controlling a remote user’s access privileges
..................348
Monitoring Remote User Activity
...................................348
CHAPTER 13
Using Alarm Manager
............................351
Alarm Definitions
.........................................................352
Defining a single-condition alarm
.................................354
Defining a multiple-condition alarm
..............................356
Managing alarm definitions
.........................................359
Responding to an Alarm Notification
.............................360
CHAPTER 14
Monitoring the Firebox Vclass
..............363
Using the Real-Time Monitor
.........................................363
Defining probes
........................................................365
Summary of Contents for Firebox V10
Page 1: ...WatchGuard Firebox Vclass User Guide Vcontroller 5 0 ...
Page 32: ...xxxii Vcontroller ...
Page 40: ...CHAPTER 1 Introduction 8 Vcontroller ...
Page 52: ...CHAPTER 2 Service and Support 20 Vcontroller ...
Page 70: ...CHAPTER 3 Getting Started 38 Vcontroller ...
Page 110: ...CHAPTER 4 Firebox Vclass Basics 78 Vcontroller ...
Page 190: ...CHAPTER 7 Using Account Manager 158 Vcontroller ...
Page 268: ...CHAPTER 9 Security Policy Examples 236 Vcontroller ...
Page 410: ...CHAPTER 14 Monitoring the Firebox Vclass 378 Vcontroller ...
Page 456: ...CHAPTER 18 Using the Diagnostics CLI Feature 424 Vcontroller ...