Overriding VPN Configuration: Quick Setup Wizard

The Quick Setup Wizard creates a VPN connection with minimum manual configuration. Default values are retained for most of the parameters.
  1. In the Security Configuration Wizard screen, click Quick Setup.
  2. Provide the following information to configure a VPN tunnel:
    Tunnel Name Provide a name for the tunnel. The name should identify the tunnel uniquely.
    Tunnel Type Configure the tunnel type as one of the following:
    • Site-to-Site – The tunnel provides a secured connection between two sites. This is the default setting.
    • Remote Access – The tunnel provides access to a network to remote devices.
    Select Interface Configure the interface to use for creating the tunnel. The following options are available:
    • VLAN – Configure the tunnel over a Virtual LAN interface. Use the spinner to configure the VLAN number.
    • WWAN – Configure the tunnel over the WAN interface.
    • PPPoE – Configure the tunnel over the PPPoE interface.
    Traffic Selector (ACL) Configure ACLs that manage the traffic passing through the VPN tunnel. The following options are available:
    • Source – Provide the source network along with its mask.
    • Destination – Provide the destination network along with its mask.
    Peer Configure the peer for this tunnel. The peer device can be specified either by its hostname or by its IP address.
    Authentication Set the authentication used to identify the peers on opposite ends of the VPN tunnel connection. The following can be configured:
    • Certificate – Use a certificate to authenticate. This is the default setting.
    • Pre-Shared Key – Use a pre-shared key to authenticate. Enter the secret key in the space provided.
    Local Identity Configure the local identity used with this peer configuration for an IKE exchange with the target VPN IPSec peer. Options include IP Address, Distinguished Name, FQDN, email, and string. The default setting is string.
    Remote Identity Configure the access point remote identifier used with this peer configuration for an IKE exchange with the target VPN IPSec peer. Options include IP Address, Distinguished Name, FQDN, email, and string. The default setting is string.
    IKE Policy Configure the Internet Key Exchange (IKE) policy to use. IKE is used to exchange authentication keys. Select from one of the following:
    • All – Use any IKE policy. This is the default setting.
    • IKE1 – Use IKE 1 only.
    • IKE2 – Use IKE 2 only.
    Transform Set Configure the transform set used to specify how traffic is protected within the crypto ACL defining the traffic that needs to be protected. Select the appropriate traffic set from the drop-down list.
  3. Click Save to save the VPN tunnel configuration.
    To exit without saving, click Cancel.