
Configuring IPsec Services
1-10
308630-15.1 Rev 00
For an inbound security policy, the action can be one or two of the following:
• Drop
• Bypass
• Log
The drop and bypass actions are mutually exclusive. The log action can be used
alone or it can be used in combination with the drop or bypass action.
Outbound Policies
An outbound policy determines how a security gateway processes data packets for
transmission across an untrusted network. You must assign an outbound policy for
all unicast traffic leaving an IPsec interface.
For an outbound policy, the action specification can be one or two of the
following:
• Protect
• Drop
• Bypass
• Log
An outbound policy with a protect action specification is mapped to a Protect SA.
The drop, protect, and bypass actions are mutually exclusive. The log action can
be used in combination with any one of the three, or it can be used alone.
Policy Criteria Specification
IPsec software inspects IP packet headers based on the specified criteria to
determine whether a policy applies to a data packet.
You must include at least one of the following criteria, and you can specify all
three criteria in an IPsec policy:
• IP source address
• IP destination address
• Protocol
Kommentare zu diesen Handbüchern