ProSecure Unified Threat Management (UTM) Appliance Reference Manual

.

Figure 7-20

Each policy contains the data that are explained in Table 7-9These fields are explained in more detail in Table 7-10 on page 7-27.

Table 7-9. List of IKE Policies Information

Item

Description (or Subfield and Description)

 

 

Name

The name that identifies the IKE policy. When you use the VPN Wizard to set up

 

a VPN policy, an accompanying IKE policy is automatically created with the

 

same name that you select for the VPN policy.

 

Note: The name is not supplied to the remote VPN endpoint.

Mode

The exchange mode: Main or Aggressive.

 

 

Local ID

The IKE/ISAKMP identifier of the UTM. The remote endpoint must have this

 

value as its remote ID.

 

 

Remote ID

The IKE/ISAKMP identifier of the remote endpoint, which must have this value

 

as its Local ID.

 

 

Encr

The encryption algorithm that is used for the IKE security association (SA). This

 

setting must match the setting on the remote endpoint.

 

 

Auth

The authentication algorithm that is used for the IKE SA. This setting must match

 

the setting on the remote endpoint.

 

 

DH

The Diffie-Hellman (DH) group that is used when exchanging keys. This setting

 

must match the setting on the remote endpoint.

 

 

To delete one or more IKE polices:

1.Select the checkbox to the left of the policy that you want to delete or click the Select All table button to select all IKE policies.

2.Click the Delete table button.

7-24

Virtual Private Networking Using IPsec Connections

v1.0, January 2010

Page 236
Image 236
NETGEAR UTM50-100NAS, UTM5-100NAS manual List of IKE Policies Information, Description or Subfield and Description