Configuring an IKE VPN
Issue 4 May 2005 155
From the Authentication drop-down list, select the type of authentication to use.
None. Packets are not authenticated.
HMAC-MD5. Packets are authenticated using the Hash-based Message
Authentication Code (HMAC) coupled with the Message Digest 5 (MD5) hash
function.
HMAC-SHA. Packets are authenticated using the Hash-based Message
Authentication Code (HMAC) coupled with the Secure Hash Algorithm (SHA). SHA is
considered to be a stronger authentication algorithm than MD5.
Any. The security gateways negotiates which encryption method to use.
Use the Lifetime text boxes and lists to control the period for creating and exchanging a
new set of unique keys.
If the Time-based value expires before the Throughput value, key creation and exchange
is performed, and likewise, if Throughput expires before the Time-based value.
Use the Locate this Proposal options to select where to put your new proposal in the
Priority Proposal List. Security gateways always start from the top of the list when maki ng
a query.
29. Click the Advanced tab to bring it to the front.
30. Select Apply VPN to clients only if you have created a VPN Object where User and User
Group Objects can communicate with IP Group Objects, but IP Group Objects cannot
communicate with each other.
Note:
Note: This is an advanced control, used for a rare case. The default setting will apply to
most configurations.
31. Select Use aggressive mode for clients if you want to speed-up the time needed for
VPNremote Clients to establish a secure connection with the VPN.
32. Select CRL Checking if you want to automatically track certificates that have been revoked
by a specific Certificate Authority (CA).
Note:
Note: This control is only available for certificate based VPNs.
33. Tunnel endpoints (VPNRemote Clients and security gateways) that use certificates shown
by a Certificate Revocation List (CRL) are denied access to the VPN. To use this feature,
you must obtain a CRL from your Certificate Authority then manually install it in the directo ry
server on a periodic basis. See Enabling CRL checkingon page 156 for more information.
34. If you use CRL Checking, in the Directory Name of Certificate Authority text box, type in
the distinguished name (DN) of the certificateauthority object located in directory server.
The object is where the CRL is located.
35. Click Save.