Traditional Mode VPNs
Editing a Traditional Mode Policy
An existing Traditional Mode policy will open in Traditional Mode.
To start a new Traditional Mode policy:
- Open the Global Properties window, VPN page.
- Select one of these options:
- Traditional mode to all new Firewall Policies
- Traditional or Simplified per new Firewall Policy
- Install the Access Control policy.
If you selected Traditional or Simplified per new Firewall Policy:
- From the R80 SmartConsole , select (Ctrl+O).
The window opens.
- Click New
The window opens.
- Give the new policy a name.
- Select the .
- Select .
- Click .
In the new Policy Rule Base, one of the available Actions is Encrypt.
Configuring VPN between Internal Gateways with ICA Certificates
To define the Security Gateways:
- For each Security Gateway that is to be part of the VPN define a Check Point Security Gateway object. In the In view, click .
- In the page of the Check Point Security Gateway object, select .
- In the window, establish Trusted Communication.
- In the page, define the IP address, network mask, and Anti-Spoofing for every Security Gateway interface
- In the > page, define the . select either:
- All IP Addresses behind Security Gateway based on Topology information or
- Manually defined. Either select an existing network or group from the drop-down list or create a new group of machines or networks by clicking New...
- In the page, , a certificate issued by the ICA.
- Still on the page, click . The window opens.
- In the Support authentication methods area, select Public Key Signatures. To specify that the Security Gateway will only use certificates issued by the ICA, click Specify and select the ICA.
- Select IKE Phase 1 encryption and data integrity methods or accept the checked defaults.
Configuring VPN between Internal Gateways with Third Party CA Certificates
To define the Security Gateways:
- For each Security Gateway that is to be part of the VPN define a Check Point Security Gateway object. In the In view, click .
- In the page of the Check Point Security Gateway object, select .
- In the window, establish Trusted Communication.
- In the page, define the IP address, network mask, and Anti-Spoofing for every Security Gateway interface
- In the > page, define the . select either:
- All IP Addresses behind Security Gateway based on Topology information or
- Manually defined. Either select an existing network or group from the drop-down list or create a new group of machines or networks by clicking New...
- In the page, , a certificate issued by the certificate authority defined in step 1.
- Still on the page, click . The window opens.
- In the Support authentication methods area, select Public Key Signatures. To specify that the Security Gateway will only use certificates issued by the ICA, click Specify and select the CA.
- Select IKE Phase 1 encryption and data integrity methods or accept the checked defaults.
- Repeat step 2 to step 7 for each Security Gateway taking part in the VPN.