Contents
INTRODUCTION 1
Supported Encryption and Authentication Methods ……………………………………………………………………………… 1
IP Addresses Used in Examples ………………………………………………………………………………………………………… 1
Documentation …………………………………………………………………………………………………………………………… 2
Additional Documentation …………………………………………………………………………………………………………… 2
GTA FIREWALL CONFIGURATION 4
Conguring the Encryption Objects …………………………………………………………………………………………………… 4
Conguring the VPN Object …………………………………………………………………………………………………………… 5
Conguring the IPSec Tunnel …………………………………………………………………………………………………………… 6
WATCHGUARD FIREWALL CONFIGURATION 8
Conguring General Settings …………………………………………………………………………………………………………… 8
Conguring Phase 1 ……………………………………………………………………………………………………………………… 9
Conguring Phase 2 ……………………………………………………………………………………………………………………… 10
Kommentare zu diesen Handbüchern