Configuring VPN Tunnels on Managed Devices

You can configure the managed devices to establish a VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. tunnel with the VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator using one of the following methods:

Configuring Auto-VPN on Managed Devices

The following procedure describes how to configure Auto-VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. using branch advertisement:

  1. In the Managed Network node hierarchy, navigate to Configuration> Services > VPN.
  2. Click Hub and Spoke.
  3. Enable the Show hub & spoke settings toggle switch.
  4. In Deployment mode, select Hub (VPNC).
  5. In Connection mode, select Automatic.
  6. Enter the same passphrase that is configured on the VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator for automatic allowlisting in the Passphrase field.
  7. Re-enter the passphrase in Confirm Passphrase field.
  8. Click Submit.
  9. Click Pending Changes.
  10. In the Pending Changes window, select the check-box and click Deploy changes.

Configuring VPN Endpoint for Managed Devices

The following procedure describes how to configure a specific VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. endpoint for the managed devices:

  1. In the Managed Network node hierarchy, navigate to Configuration> Services > VPN.
  2. Click Hub and Spoke.
  3. Enable the Show hub & spoke settings toggle switch.
  4. In Deployment mode, select Spoke (Branch Gateway).
  5. In Connection mode, select Manual.
  6. Click + from the Hubs table to add the following VPN Virtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. Concentrator hub information:
  7. Click Submit.
  8. Click Pending Changes.
  9. In the Pending Changes window, select the check-box and click Deploy changes.