NETGEAR UTM5 Reference Manual page 279

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Table 67. Add IKE Policy screen settings (continued)
Setting
Description
Identifier Type
From the drop-down list, select one of the following ISAKMP identifiers to be used
by the UTM, and then specify the identifier in the Identifier field:
Identifier
Remote
Identifier Type
From the drop-down list, select one of the following ISAKMP identifiers to be used
by the remote endpoint, and then specify the identifier in the Identifier field:
Identifier
IKE SA Parameters
Encryption Algorithm
From the drop-down list, select one of the following five algorithms to negotiate the
security association (SA):
Authentication
From the drop-down list, select one of the following algorithms to use in the VPN
Algorithm
header for the authentication process:
Virtual Private Networking Using IPSec Connections
Local WAN IP. The WAN IP address of the UTM. When you select this option,
the Identifier field automatically shows the IP address of the selected WAN
interface.
FQDN. The Internet address for the UTM.
User FQDN. The email address for a local VPN client or the UTM.
DER ASN1 DN. A distinguished name (DN) that identifies the UTM in the
DER encoding and ASN.1 format.
Depending on the selection of the Identifier Type drop-down
list, enter the IP address, email address, FQDN, or
distinguished name.
Remote WAN IP. The WAN IP address of the remote endpoint. When you
select this option, the Identifier field automatically shows the IP address of the
selected WAN interface.
FQDN. The FQDN for a remote gateway.
User FQDN. The email address for a remote VPN client or gateway.
DER ASN1 DN. A distinguished name (DN) that identifies the remote endpoint
in the DER encoding and ASN.1 format.
Depending on the selection of the Identifier Type drop-down
list, enter the IP address, email address, FQDN, or
distinguished name.
DES. Data Encryption Standard (DES).
3DES. Triple DES. This is the default algorithm.
AES-128. Advanced Encryption Standard (AES) with a 128-bit key size.
AES-192. AES with a 192-bit key size.
AES-256. AES with a 256-bit key size.
SHA-1. Hash algorithm that produces a 160-bit digest. This is the default
setting.
MD5. Hash algorithm that produces a 128-bit digest.
AES-256. AES with a 256-bit key size.
AES-512. AES with a 512-bit key size.
279

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents