<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.3av.us/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.3av.us/feed.php">
        <title>Antonio Perez - firewall:configuration:vpn</title>
        <description></description>
        <link>https://wiki.3av.us/</link>
        <image rdf:resource="https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png" />
       <dc:date>2026-04-18T17:34:31+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:configuration_settings_for_the_admit_one_vpn_client_from_funk_software&amp;rev=1617117926&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:how_to_configure_a_vpn_tunnel&amp;rev=1617115667&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:ocsg_to_ocif_vpn_back-to-back_example_configuration&amp;rev=1617118621&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:why_cant_ipsec_nat_just_get_along&amp;rev=1617133193&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png">
        <title>Antonio Perez</title>
        <link>https://wiki.3av.us/</link>
        <url>https://wiki.3av.us/lib/exe/fetch.php?media=wiki:logo.png</url>
    </image>
    <item rdf:about="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:configuration_settings_for_the_admit_one_vpn_client_from_funk_software&amp;rev=1617117926&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-30T15:25:26+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>configuration_settings_for_the_admit_one_vpn_client_from_funk_software</title>
        <link>https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:configuration_settings_for_the_admit_one_vpn_client_from_funk_software&amp;rev=1617117926&amp;do=diff</link>
        <description>Funk AdmitOne VPN client for PDA configuration with Superstack 3 Firewall

This document explains the configuration settings for the AdmitOne VPN client from Funk Software (this is an OEM VPN client from SafeNet). This VPN client should work with the Superstack 3 firewall running Agent 6.02 or higher.</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:how_to_configure_a_vpn_tunnel&amp;rev=1617115667&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-30T14:47:47+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>how_to_configure_a_vpn_tunnel</title>
        <link>https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:how_to_configure_a_vpn_tunnel&amp;rev=1617115667&amp;do=diff</link>
        <description>HOW TO CONFIGURE A VPN TUNNEL

Firewall VPN Configuration

	* 1 Log into the Firewall
	* Go to the VPN button and click on the “VPN Configure” tab
	* Locate the “Security Association” pull down menu and select “-Add New SA-“
	* Select “IKE” under the “IPSec Keying Mode:” pull down menu</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:ocsg_to_ocif_vpn_back-to-back_example_configuration&amp;rev=1617118621&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-30T15:37:01+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>ocsg_to_ocif_vpn_back-to-back_example_configuration</title>
        <link>https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:ocsg_to_ocif_vpn_back-to-back_example_configuration&amp;rev=1617118621&amp;do=diff</link>
        <description>OCSG TO OCIF VPN BACK-TO-BACK EXAMPLE TO CONFIGURE













 --- David Gonzalez 2021/03/30 10:32</description>
    </item>
    <item rdf:about="https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:why_cant_ipsec_nat_just_get_along&amp;rev=1617133193&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-30T19:39:53+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>why_cant_ipsec_nat_just_get_along</title>
        <link>https://wiki.3av.us/doku.php?id=firewall:configuration:vpn:why_cant_ipsec_nat_just_get_along&amp;rev=1617133193&amp;do=diff</link>
        <description>WHY CAN&#039;T IPSEC AND NAT JUST GET ALONG?

Both IPsec and NAT have been with us for some time, but making them play together has been hard work. To IP gurus, NAT (Network Address Translation) is an ugly kludge because it changes the way IP works at a fundamental level. To you, the network manager responsible for handling network-addressing issues, NAT is often your friend, regardless of whether you&#039;re at a large ISP or enterprise, or at an SME (small-to-medium enterprise). Why? Because NAT lets yo…</description>
    </item>
</rdf:RDF>
