Quick Reference Guide
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
6-20 Virtual Private Networking Using IPsec
v1.0, January 2010
4. Click Apply to save your changes. The modified IKE policy is displayed in the List of IKE
Policies table.
Configuring VPN Policies
You can create two types of VPN policies. When using the VPN Wizard to create a VPN policy,
only the Auto method is available.
• Manual. All settings (including the keys) for the VPN tunnel are manually entered at each end
(both VPN endpoints). No third party server or organization is involved.
• Auto. Some parameters for the VPN tunnel are generated automatically by using the IKE
protocol to perform negotiations between the two VPN endpoints (the local ID endpoint and
the remote ID endpoint). You still must manually enter all settings on the remote VPN
endpoint (unless the remote VPN endpoint also has a VPN Wizard).
In addition, a Certificate Authority (CA) can also be used to perform authentication (see
“Managing Certificates” on page 8-11). To use a CA, each VPN gateway must have a certificate
from the CA. For each certificate, there is both a public key and a private key. The public key is
freely distributed, and is used to encrypt data. The receiver then uses its private key to decrypt the
data (without the private key, decryption is impossible). The use of certificates for authentication
reduces the amount of data entry required on each VPN endpoint.
The VPN Policies Screen
The VPN Policies screen allows you to add additional policies—either Auto or Manual—and to
manage the VPN policies already created. You can edit policies, enable or disable policies, or
delete them entirely. The rules for VPN policy use are:
1. Traffic covered by a policy will automatically be sent via a VPN tunnel.
2. When traffic is covered by two or more policies, the first matching policy will be used. (In this
situation, the order of the policies is important. However, if you have only one policy for each
remote VPN endpoint, then the policy order is not important.)
3. The VPN tunnel is created according to the parameters in the SA (Security Association).
4. The remote VPN endpoint must have a matching SA, or it will refuse the connection.
To access the VPN Policies screen:
1. Select VPN > IPsec VPN from the main/submenu. The IPsec VPN submenu tabs appear with
the IKE Policies screen in view (see Figure 6-13 on page 6-13).










