VPN Communities - Tunnel Management

What can I do here?

Use this window to set permanent VPN tunnels and VPN TunnelClosed Sharing.

Getting Here - SmartConsoleClosed > Security PoliciesClosed > Access Control > Policy > Access Tools > VPN Communities > New Star/Meshed Community > Tunnel Management

Understanding VPN Tunnels

VPN Management Tunnel Options

Permanent Tunnels

Permanent Tunnels are VPN tunnels that are constantly kept active and as a result, make it easier to recognize malfunctions and connectivity problems. Administrators can monitor the two sides of a VPN tunnel, and identify problems without delay.

Each VPN tunnel in the community may be set to be a Permanent Tunnel. Since Permanent Tunnels are constantly monitored, if the VPN tunnel is down, then a log, alert, or user defined action, can be issued. Permanent Tunnels can only be established between Security Gateways. The configuration of Permanent Tunnels takes place on the community level and:

  • On all tunnels in the community - This option sets every VPN tunnel in the community as permanent.

  • On all tunnels of specific Gateways - Use this option to configure specific gateways to have permanent tunnels.

  • On specific tunnels in the community - This feature allows configuring specific tunnels between specific gateways as permanent.

Enable Route Injection Mechanism (RIM)

The Route Injection Mechanism (RIM) is a feature of the VPN module used to:

  • Route return packets through the correct link or gateway

  • Overcome link down time.

For example, when a link becomes unavailable, an alternative path is added or "injected" to the local routing table on the gateway. If a dynamic routing protocol is then configured, this change is propagated to the network behind the gateway. Route injection can be integrated with MEP functionality, providing an alternative to IP pool NAT in situations where large numbers of static IP addresses are not available.

Tracking Options

Several types of alerts can be configured to keep administrators up to date on the status of the VPN tunnels. Choosing one of these alert types will enable immediate identification of the problem and the ability to respond to these issues more effectively. The Tracking Options are:

  • None - No action is taken.

  • Log - The connection or loss of connection is logged.

  • Popup Alert - The action specified in the Alert Commands page of the Global Properties window is taken.

  • Mail Alert - The action specified in the Alert Commands page of the Global Properties window is taken.

  • SNMP Trap Alert - The action specified in the Alert Commands page of the Global Properties window is taken.

  • User Defined Alert - Three different User Defined Alerts can be configured in the Alert Commands page of the Global Properties window. The action taken follows the pre-defined configuration.

VPN Tunnel Sharing

Since various vendors implement IPSec tunnels in a number of different methods, administrators need to cope with different means of implementation of the IPSec framework.

There are three settings for controlling the number of VPN tunnels between peer gateways:

  • One VPN tunnel per each pair of hosts - A VPN tunnel is created for every session initiated between every pair of hosts.

  • One VPN tunnel per subnet pair - Once a VPN tunnel has been opened between two subnets, subsequent sessions between the same subnets will share the same VPN tunnel. This is the default setting and is compliant with the IPSec industry standard.

  • One VPN tunnel per Gateway pair - One VPN tunnel is created between peer gateways and shared by all hosts behind each peer gateway.