Siemens se5880 manual IKE IPSec Policies Definition

Page 76

SIEMENS se5880 Ethernet Security Router

Chapter 6 Security Setup

User’s Guide

IKE/IPSec Configuration

 

 

IKE IPSec Policies Definition

IPSec policies are criteria for packets that IPSec will recognize, and actions that IPSec will take upon recognition. To define a new IKE IPSec policy:

1.Click Create next to IKE IPSec Policies from the Advanced IKE/IPSec Setup page. This displays the IKE IPSec Policy Definition page.

2.In IPSec Policy Name, enter a logical name for the IPSec policy. The name specified is of no consequence to the other IPSec party.

3.From the Peer Binding drop-down menu, select the remote IKE peer to which this policy will apply. This peer must already be defined as an IKE Peer.

4.From the IPSec Proposal Bindings drop-down menu, select the IKE IPSec proposal to be used with this policy. The IKE IPSec proposal must be already defined as an IKE IPSec Proposal.

5.From the PFS Group drop-down menu, select one of the following the Diffie-Hellman group to use for Perfect Forward Secrecy. Perfect Forward Secrecy enhances the security of the key exchange. In the event of a key becoming compromised, only the data protected by that compromised key becomes vulnerable:

None

Group 1: Uses Diffie-Hellman Group 1 (768 bits).

Group 2: Uses Diffie-Hellman Group 2 (1024 bits).

6.From the IP Protocol drop-down menu, select the protocol of the IP traffic that uses this protocol.

7.In Source IP Address, enter the IP address of the local area network that will use this policy. This will usually be the IP address assigned to the network local to your router.

8.In Source Subnet Mask, enter the subnet mask of the local area network that will use this policy. This will usually be the subnet mask assigned to the network local to your router.

SIEMENS

70

Image 76
Contents Se5880 Software License and Limited Warranty Software LicenseGeneral Provisions Table of Contents Advanced Setup User SetupSecurity Setup Monitoring Router Front Panel Back PanelHardware Specifications Software Specifications Security Installation Requirements Package ContentsNetwork Service Provider Requirements PC RequirementsHardware Installation PC Configuration Windows 98/MEWindows NT Select TCP/IP Protocol from the Network Protocols listWindows Windows XP Mac OS Mac OSX Linux Configuring the Router Establish ConnectionRouter Information To do this Refer toAccess Easy Setup Wizard Untrusted Interface ConfigurationUsing PPPoE Not Using PPPoEUsing PPPoE Not Using PPPoEDynamic Host Configuration Protocol Trusted Interface Configuration User Setup User ManagementAdding/Modifying a User Account Deleting a User Account User Lookup LocalRadius NoneTrusted Secure Mode ConfigurationUntrusted Configure the Radius Server Configure the TacPlus Server Management Classes Class Functional AreasChange Password Access Control No access restrictionsClick Save and Reboot Telnet WebAdvanced Setup DMZ ApplyDMZ Router Clock Dhcp QoS Configure QoS Policy Siemens To the end Reorder QoS PoliciesBefore policy Routing Table Configuration Dial Backup Click Enable Dial BackupInternal Modem External Modem Switch Management Switch Mirror Configuration Switch Age Time Command Line Interface File Editor Security Setup NAT Default DisablePort Number Snmp Password Enter the New Password and New Password againSnmp IP Filter Click Add IP RangeSecure Shell Key GeneratorConfigure SSH Load Keys Key Generator Firewall Scripts Stateful Firewall Firewall RulesConfigure Stateful Firewall View Dropped Packets Configure Firewall Rules Protocol/Port ApplicationDelete Firewall Rules IKE/IPSec Configuration Easy IKE/IPSec Setup Advanced IKE/IPSec Setup IKE PeersIKE Peers Definition IKE Proposals Definition IKE IPSec Proposals Definition Siemens IKE IPSec Policies Definition Siemens VPN Log On Monitoring Router System SummaryEthernet Interface Information Remote Connection InformationIP Routing Information System InformationDiagnostics PPPoE SessionInterface Information ATM StatisticsRouting Table Information Files InformationList All Configuration Data Memory UsageTCP/IP Statistics