4. CONFIGURATION
Continued from previous page
Item
Description
CA Certificate
Certificate for X.509 authentication.
Remote Certificate
Certificate for X.509 authentication.
Local Certificate
Certificate for X.509 authentication.
Local Private Key
Private key for X.509 authentication.
Local Passphrase
Passphrase used during private key generation.
Extra Options
Specifies the additional parameters of the IPsec tunnel for exam-
ple, secure parameters.
Table 40: IPsec Tunnel Configuration
The IPsec function supports the following types of identifiers (ID) for both sides of the
tunnel,
Remote ID
and
Local ID
parameters:
•
IP address (for example, 192.168.1.1)
•
DN (for example, C=CZ,O=Conel,OU=TP,CN=A)
•
FQDN (for example, @director.conel.cz) –
the @ symbol proceeds the FQDN.
•
User FQDN (for example, [email protected])
The certificates and private keys have to be in the PEM format. Use only certificates containing
start and stop tags.
The random time, after which the router re-exchanges new keys is defined as follows:
Lifetime - (Rekey random value in range (from 0 to Rekey margin * Rekey Fuzz/100))
The default exchange of keys is in the following time range:
•
Minimal time: 1h - (9m + 9m) = 42m
•
Maximal time: 1h - (9m + 0m) = 51m
We recommend that you maintain the default settings. When you set key exchange times
higher, the tunnel produces lower operating costs, but the setting also provides less security.
Conversely, when you reducing the time, the tunnel produces higher operating costs, but
provides for higher security.
The changes in settings will apply after clicking the
Apply
button.
64
Summary of Contents for SPECTRE V3
Page 1: ...Configuration Manual for v3 Routers ...
Page 22: ...3 STATUS Figure 4 WiFi Scan 13 ...
Page 32: ...4 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 23 ...
Page 37: ...4 CONFIGURATION Figure 19 Example of VRRP configuration backup router 28 ...
Page 44: ...4 CONFIGURATION Figure 20 Mobile WAN Configuration 35 ...
Page 51: ...4 CONFIGURATION Figure 25 WiFi Configuration 42 ...
Page 74: ...4 CONFIGURATION Figure 39 IPsec Tunnels Configuration 65 ...
Page 105: ...4 CONFIGURATION Figure 63 Example 2 USB port configuration 96 ...