ProSecure Unified Threat Management (UTM) Appliance Reference Manual
7-22 Virtual Private Networking Using IPsec Connections
v1.0, January 2010
Managing IPsec VPN Policies
After you have used the VPN Wizard to set up a VPN tunnel, a VPN policy and an IKE policy are
stored in separate policy tables. The name that you selected as the VPN tunnel connection name
during the VPN Wizard setup identifies both the VPN policy and IKE policy. You can edit existing
policies, or manually add new VPN and IKE policies directly in the policy tables.
Figure 7-19