Ike Policy Table - NETGEAR FVS338 - ProSafe VPN Firewall 50 Router Reference Manual

Vpn firewall
Hide thumbs Also See for FVS338 - ProSafe VPN Firewall 50 Router:
Table of Contents

Advertisement

3. An IKE session is established, using the SA (Security Association) parameters specified in a
matching IKE Policy:
Keys and other parameters are exchanged.
An IPsec SA (Security Association) is established, using the parameters in the VPN
Policy.
The VPN tunnel is then available for data transfer.

IKE Policy Table

When you use the VPN Wizard to set up a VPN tunnel, an IKE Policy is established and populated
in the Policy Table and is given the same name as the new VPN connection name. You can also
edit exiting policies or add new IKE policies directly on the Policy Table Screen. Each policy
contains the following data:
Name. Uniquely identifies each IKE policy. The name is chosen by you and used for the
purpose of managing your policies; it is not supplied to the remote VPN Server. If the Policy is
a Client Policy, it will be prepended by an "*".
Mode. Two modes are available: either "Main" or "Aggressive".
Main Mode is slower but more secure.
Aggressive mode is faster but less secure. (If specifying either a FQDN or a User FQDN
name as the Local ID/Remote ID, aggressive mode is automatically selected.)
Local ID. The IKE/ISAKMP identify of this device. (The remote VPN must have this value as
their "Remote ID".)
Remote ID. The IKE/ISAKMP identify of the remote VPN Gateway. (The remote VPN must
have this value as their "Local ID".)
Encr. Encryption Algorithm used for the IKE SA. The default setting using the VPN Wizard is
3DES. (This setting must match the Remote VPN.)
Auth. Authentication Algorithm used for the IKE SA. The default setting using the VPN
Wizard is SHA1. (This setting must match the Remote VPN.)
DH. Diffie-Hellman Group. The Diffie-Hellman algorithm is used when exchanging keys. The
DH Group sets the number of bits. The VPN Wizard default setting is Group 2. (This setting
must match the Remote VPN.)
Enable Dead Peer Detection: Dead Peer Detection is used to detect whether the peer is alive
or not. If the peer is detected as dead, the IPSec and IKE Security Association are deleted.
Virtual Private Networking
FVS338 ProSafe VPN Firewall 50 Reference Manual
v1.0, March 2009
5-15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosafe vpn firewall 50 fvs338 fvs338 fvs338

Table of Contents