NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 233

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
.
Figure 7-20
Each policy contains the data that are explained in
detail in
Table
7-10.
Table 7-9. List of IKE Policies Information
Item
Description (or Subfield and Description)
Name
The name that identifies the IKE policy. When you use the VPN Wizard to set up
a VPN policy, an accompanying IKE policy is automatically created with the
same name that you select for the VPN policy.
Note: The name is not supplied to the remote VPN endpoint.
Mode
The exchange mode: Main or Aggressive.
Local ID
The IKE/ISAKMP identifier of the UTM. The remote endpoint must have this
value as its remote ID.
Remote ID
The IKE/ISAKMP identifier of the remote endpoint, which must have this value
as its Local ID.
Encr
The encryption algorithm that is used for the IKE security association (SA). This
setting must match the setting on the remote endpoint.
Auth
The authentication algorithm that is used for the IKE SA. This setting must match
the setting on the remote endpoint.
DH
The Diffie-Hellman (DH) group that is used when exchanging keys. This setting
must match the setting on the remote endpoint.
To delete one or more IKE polices:
1. Select the checkbox to the left of the policy that you want to delete or click the select all table
button to select all IKE policies.
2. Click the delete table button.
Virtual Private Networking Using IPsec Connections
Table 7-9
v1.0, September 2009
These fields are explained in more
7-23

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents