|
I have a question, I hope someone of you has had
this trouble before. I have two Firewall-1 customers who have each a Legato High
Availability Module. So, you can imagine VPN from a 2-fw-cluster to another
2-fw-cluster. Licences are ok for both of them with the same encryption
algorithm. What I wonder is if there is going to be any trouble or surprise
during the implementation.
Procedure for VPN 1-fw to 1-fw is simple, set both
objects & encryption domains, then exchange CA Keys and retrieve each other
DH key. Is so simple I'm wondering if it's going to be similar in a 2-fw to 2-fw
configuration.
Additionally, I hope hardware supports VPN
processing. From one site I have 2 Sun Enterprise 250 and from the other site I
have 2 Sun Ultra 10 machines. How can I measure VPN impact in processor
eficiency?
Is there someone who has made this before in order
to share tips?
Thanks,
Fabiola Mayorca
|
