Field
Description
whether or not a Security Association (SA) is still valid. This
function sends and receives signals every 5 seconds, depend-
ing on the configuration. If these signals are not received after
20 seconds, the SA is discarded as invalid.
Possible values:
•
,3*
(default value): Automatic detection of whether
the remote terminal is a bintec elmeg device. If it is,
>
7 " N 6*#
(for a remote terminal with bintec
elmeg) or
*
(for a remote terminal without bintec el-
meg) is set.
•
*
: Your device sends and expects no heartbeat. Set
this option if you use devices from other manufacturers.
•
>7 " 6* +0#
: Your device expects a
heartbeat from the peer but does not send one itself.
•
>7 " +0#
: Your device expects no heart-
beat from the peer, but sends one itself.
•
>7 " N 6*#
: Your device expects a
heartbeat from the peer and sends one itself.
Propagate PMTU
Select whether the PMTU (Path Maximum Transfer Unit) is to
be propagated during phase 2.
The function is enabled with
7+
.
The function is enabled by default.
14.1.4 XAUTH Profiles
In the XAUTH Profiles menu a list of all XAUTH profiles is displayed.
Extended Authentication for IPSec (XAuth) is an additional authentication method for IPSec
tunnel users.
The gateway can take on two different roles when using XAuth as it can act as a server or
as a client:
• As a server the gateway requires a proof of authorisation.
• As a client the gateway provides proof of authorisation.
In server mode multiple users can obtain authentication via XAuth, e.g. users of Apple
bintec elmeg GmbH
14 VPN
be.IP 4isdn
263