ProSecure Unified Threat Management (UTM) Appliance

Manage IKE Policies

The Internet Key Exchange (IKE) protocol performs negotiations between the two VPN gateways and provides automatic management of the keys that are used for IPSec connections. It is important to remember that:

An automatically generated VPN policy (auto policy) needs to use the IKE negotiation protocol.

A manually generated VPN policy (manual policy) cannot use the IKE negotiation protocol.

IKE policies are activated when the following situations occur:

1.The VPN policy selector determines that some traffic matches an existing VPN policy:

If the VPN policy is of an auto policy type, the IKE policy that is specified in the Auto Policy Parameters section of the Add VPN Policy screen (see Figure 182 on page 303) is used to start negotiations with the remote VPN gateway.

If the VPN policy is of a manual policy type, the settings that are specified in the Manual Policy Parameters section of the Add VPN Policy screen (see Figure 182 on page 303) are accessed, and the first matching IKE policy is used to start negotiations with the remote VPN gateway:

-If negotiations fail, the next matching IKE policy is used.

-If none of the matching IKE policies are acceptable to the remote VPN gateway, then a VPN tunnel cannot be established.

2.An IKE session is established, using the security association (SA) settings that are specified in a matching IKE policy:

Keys and other settings are exchanged.

An IPSec SA is established, using the settings that are specified in the VPN policy.

The VPN tunnel is then available for data transfer.

When you use the VPN Wizard to set up a VPN tunnel, an IKE policy is established and populated in the List of IKE Policies, and is given the same name as the new VPN connection name. You can also edit exiting policies or add new IKE policies from the IKE Policies screen.

IKE Policies Screen

To access the IKE Policies screen:

Select VPN > IPSec VPN. The IPSec VPN submenu tabs display with the IKE Policies screen in view. (The following figure shows some examples.)

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections

292

Page 292
Image 292
NETGEAR UTM5EW-100NAS, STM150EW-100NAS Manage IKE Policies, IKE Policies Screen,  To access the IKE Policies screen, 292