Prestige 2602H/HW Series User’s Guide
Table 72 VPN IKELABELDESCRIPTION
IPSec Setup
Active Select this check box to activate this VPN policy. This option determines whether a VPN rule is applied before a packet leaves the firewall.
Keep Alive Select either Yes or No from the
Select Yes to have the Prestige automatically reinitiate the SA after the SA lifetime times out, even if there is no traffic. The remote IPSec router must also have keep alive enabled in order for this feature to work.
NAT Traversal | Select this check box to enable NAT traversal. NAT traversal allows you to set up |
| a VPN connection when there are NAT routers between the two IPSec routers. |
| Note: The remote IPSec router must also have NAT traversal |
| enabled. |
You can use NAT traversal with ESP protocol using Transport or Tunnel mode, but not with AH protocol nor with manual key management. In order for an IPSec router behind a NAT router to receive an initiating IPSec packet, set the NAT router to forward UDP port 500 to the IPSec router behind the NAT router.
Name Type up to 32 characters to identify this VPN policy. You may use any character, including spaces, but the Prestige drops trailing spaces.
IPSec Key Mode Select IKE or Manual from the
Negotiation Mode Select Main or Aggressive from the
Encapsulation Select Tunnel mode or Transport mode from the
DNS Server (for If there is a private DNS server that services the VPN, type its IP address here. IPSec VPN) The Prestige assigns this additional DNS server to the Prestige's DHCP clients
that have IP addresses in this IPSec rule's range of local addresses.
A DNS server allows clients on the VPN to find other computers and servers on the VPN by their (private) domain names.
Local | Local IP addresses must be static and correspond to the remote IPSec router's |
| configured remote IP addresses. |
| Two active SAs can have the same configured local or remote IP address, but not |
| both. You can configure multiple SAs between the same local and remote IP |
| addresses, as long as only one is active at any time. |
| In order to have more than one active rule with the Secure Gateway Address |
| field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between |
| rules. |
| If you configure an active rule with 0.0.0.0 in the Secure Gateway Address field |
| and the LAN’s full IP address range as the local IP address, then you cannot |
| configure any other active rules with the Secure Gateway Address field set to |
| 0.0.0.0. |
Local Address Use the
Subnet to specify IP addresses on a network by their subnet mask.
Chapter 17 VPN Screens | 223 |