FVS338 ProSafe VPN Firewall 50 Reference Manual
•Name. Uniquely identifies each IKE policy. The name is chosen by you and used for the purpose of managing your policies; it is not supplied to the remote VPN Server. If the Policy is a Client Policy, it will be prepended by an “*”.
•Mode. Two modes are available: either “Main” or “Aggressive”.
–Main Mode is slower but more secure.
–Aggressive mode is faster but less secure. (If specifying either a FQDN or a User FQDN name as the Local ID/Remote ID, aggressive mode is automatically selected.)
•Local ID. The IKE/ISAKMP identify of this device. (The remote VPN must have this value as their “Remote ID”.)
•Remote ID. The IKE/ISAKMP identify of the remote VPN Gateway. (The remote VPN must have this value as their “Local ID”.)
•Encr. Encryption Algorithm used for the IKE SA. The default setting using the VPN Wizard is 3DES. (This setting must match the Remote VPN.)
•Auth. Authentication Algorithm used for the IKE SA. The default setting using the VPN Wizard is SHA1. (This setting must match the Remote VPN.)
•DH.
•Enable Dead Peer Detection: Dead Peer Detection is used to detect whether the peer is alive or not. If the peer is detected as dead, the IPSec and IKE Security Association are deleted.
To gain a more complete understanding of the encryption, authentication and DH algorithm technologies, see Appendix C, “Related Documents”.
VPN Policies
You can create two types of VPN Policies. When using the VPN Wizard to create a VPN policy, only the Auto method is available.
•Manual. All settings (including the keys) for the VPN tunnel are manually input at each end (both VPN endpoints). No third party server or organization is involved.
•Auto. Some parameters for the VPN tunnel are generated automatically by using the IKE (Internet Key Exchange) protocol to perform negotiations between the two VPN endpoints (the Local ID Endpoint and the Remote ID Endpoint).
Virtual Private Networking |