ProSecure Unified Threat Management (UTM) Appliance

Table 72. Add IKE Policy screen settings (continued)

Setting

Description

 

 

 

Identifier Type

From the drop-down list, select one of the following ISAKMP identifiers to be used

 

by the UTM, and then specify the identifier in the Identifier field:

 

Local WAN IP. The WAN IP address of the UTM. When you select this option,

 

the Identifier field automatically shows the IP address of the selected WAN

 

interface.

 

 

FQDN. The Internet address for the UTM.

 

User FQDN. The email address for a local VPN client or the UTM.

 

DER ASN1 DN. A distinguished name (DN) that identifies the UTM in the

 

DER encoding and ASN.1 format.

 

 

 

 

Identifier

Depending on the selection of the Identifier Type drop-down

 

 

list, enter the IP address, email address, FQDN, or

 

 

distinguished name.

 

 

 

Remote

 

 

Identifier Type

From the drop-down list, select one of the following ISAKMP identifiers to be used

 

by the remote endpoint, and then specify the identifier in the Identifier field:

 

Remote WAN IP. The WAN IP address of the remote endpoint. When you

 

select this option, the Identifier field automatically shows the IP address of the

 

selected WAN interface.

 

FQDN. The FQDN for a remote gateway.

 

User FQDN. The email address for a remote VPN client or gateway.

 

DER ASN1 DN. A distinguished name (DN) that identifies the remote endpoint

 

in the DER encoding and ASN.1 format.

 

Identifier

Depending on the selection of the Identifier Type drop-down

 

 

list, enter the IP address, email address, FQDN, or

 

 

distinguished name.

 

 

 

IKE SA Parameters

 

 

 

 

 

Encryption Algorithm

From the drop-down list, select one of the following five algorithms to negotiate the

 

security association (SA):

 

DES. Data Encryption Standard (DES).

 

3DES. Triple DES. This is the default algorithm.

 

AES-128. Advanced Encryption Standard (AES) with a 128-bit key size.

 

AES-192. AES with a 192-bit key size.

 

AES-256. AES with a 256-bit key size.

 

 

Authentication

From the drop-down list, select one of the following algorithms to use in the VPN

Algorithm

header for the authentication process:

 

SHA-1. Hash algorithm that produces a 160-bit digest. This is the default

 

setting.

 

 

MD5. Hash algorithm that produces a 128-bit digest.

 

AES-256. AES with a 256-bit key size.

 

AES-512. AES with a 512-bit key size.

 

 

 

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections

297

Page 297
Image 297
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual 297, Remote, IKE SA Parameters