Compatible Systems 2+ manual Set up Key Management, IKE Key Management

Models: 2+ 2

1 75
Download 75 pages 56.33 Kb
Page 44
Image 44

38

Chapter 6 - Basic Configuration Guide

 

 

C.If you are using both Ethernet ports, then the Bind To interface should be set to Ethernet 1. For single Ethernet setups, it should be Ethernet 0. This specifies which interface on this device will act as the end point for the tunnels defined by this configuration. Packets sent from this device to the remote Tun- nel Partner will use this interface’s IP address as a source address.

D.Click OK.

3. Set up Key Management

These settings control how the local Tunnel Partner will identify and authenticate the remote Tunnel Partner. IKE Key Management is recommended.

IKE Key Management

Once a VPN port has been created, you may access the IKE Key Management dialog box by clicking on the port’s icon in the Device View and selecting IKE Key Management.

A.From the pull-down menu, select the Key Manage method to use for this tunnel.

If Auto key management is selected, IKE will be used to allow two devices to negotiate between themselves which encryption and authentication methods will be used for the tunnel.

If Manual is selected, this Tunnel Partner will not use IKE, and the tunnel’s encryption and authentication parameters must be manually set in the Manual Key Management dialog box, which is not described in this guide.

If Initiate is selected, this Tunnel Partner will use IKE, but

Page 44
Image 44
Compatible Systems 2+ manual Set up Key Management, IKE Key Management