ProSecure Unified Threat Management (UTM) Appliance

Figure 179.

Each policy contains the data that are explained in the following table. These fields are explained in more detail in Table 72 on page 296.

Table 71. List of IKE Policies table information

Setting

Description

 

 

Name

The name that identifies the IKE policy. When you use the VPN Wizard to set up a VPN

 

policy, an accompanying IKE policy is automatically created with the same name that you

 

select for the VPN policy.

 

Note: The name is not supplied to the remote VPN endpoint.

 

 

Mode

The exchange mode: Main or Aggressive.

 

 

Local ID

The IKE/ISAKMP identifier of the UTM. The remote endpoint needs to have this value as

 

its remote ID.

 

 

Remote ID

The IKE/ISAKMP identifier of the remote endpoint, which needs to have this value as its

 

local ID.

 

 

Encr

The encryption algorithm that is used for the IKE security association (SA). This setting

 

needs to match the setting on the remote endpoint.

 

 

Auth

The authentication algorithm that is used for the IKE SA. This setting needs to match the

 

setting on the remote endpoint.

 

 

DH

The Diffie-Hellman (DH) group that is used when keys are exchanged. This setting needs

 

to match the setting on the remote endpoint.

 

 

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections

293

Page 293
Image 293
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual List of IKE Policies table information, 293