38 | Chapter 6 - Basic Configuration Guide |
|
|
C.If you are using both Ethernet ports, then the Bind To interface should be set to Ethernet 1. For single Ethernet setups, it should be Ethernet 0. This specifies which interface on this device will act as the end point for the tunnels defined by this configuration. Packets sent from this device to the remote Tun- nel Partner will use this interface’s IP address as a source address.
D.Click OK.
3. Set up Key Management
These settings control how the local Tunnel Partner will identify and authenticate the remote Tunnel Partner. IKE Key Management is recommended.
IKE Key Management
Once a VPN port has been created, you may access the IKE Key Management dialog box by clicking on the port’s icon in the Device View and selecting IKE Key Management.
A.From the
If Auto key management is selected, IKE will be used to allow two devices to negotiate between themselves which encryption and authentication methods will be used for the tunnel.
If Manual is selected, this Tunnel Partner will not use IKE, and the tunnel’s encryption and authentication parameters must be manually set in the Manual Key Management dialog box, which is not described in this guide.
If Initiate is selected, this Tunnel Partner will use IKE, but