Configuring IPSec Mobile User VPN212 Firebox X Edge e-Seriesnames to IP addresses. The trusted interface of the Edge must have access to these servers. Type aDNS server and WINS server IP address in the text boxes near the bottom of the Mobile User page.Enabling MUVPN access for a Firebox user account1 Add a new Firebox user or edit a Firebox user, as described in “Using Local FireboxAuthentication” on page 158.2 Click the MUVPN tab.3 Select the Enable MUVPN for this account check box.4 Type a shared key in the related field.The .wgx file is encrypted with this shared key. The user enters the shared key when the .wgx fileis imported. Do not give the shared key to any user that is not authorized to use this Firebox useraccount.5 Type the virtual IP address in the related field.The virtual IP address must be an address on the Firebox X Edge trusted or optional network thatis not used. This address is used by the remote computer to connect to the Firebox X Edge.6 From the Authentication Algorithm drop-down list, select the type of authentication.The options are MD5-HMAC and SHA1-HMAC.7 From the Encryption Algorithm drop-down list, select the type of encryption.The options are DES-CBC, 3DES-CBC, AES 128-bit, AES 192-bit, or AES 256-bit.8 Set MUVPN key expiration in kilobytes and/or hours. The default values are 8192 KB and 24hours.To remove a size and/or time expiration, set the value to zero (0).9 From the VPN Client Type drop-down list, select Mobile User if the remote user is connectingfrom a desktop or laptop computer.10 Select the All traffic uses tunnel (0.0.0.0/0 IP Subnet) check box if the remote client sends allits traffic (including usual web traffic) through the VPN tunnel to the Firebox X Edge. This can alsolet the MUVPN client connect with other networks that the Edge connects to.If you do not select this check box, the remote user can connect with the Firebox X Edge trustedor optional network only. You must select this check box for the remote user to be able toconnect to:- Networks on the other side of a Branch Office VPN tunnel that the Edge has connected.- Computers on the Edge’s optional network.- Networks that are behind a static route on the trusted or optional interface. For moreinformation, see “Making Static Routes” on page 69.11 Click Submit.