Authentication method to be used in IKE negotiations in IKE-based tunnels.
•
Pre-shared Key
: IKE peers authenticate each other by computing and sending a
keyed hash of data that includes the Pre-shared Key. If the receiving peer is able
to create the same hash independently using its Pre-shared key, it knows that both
peers must share the same secret, thus authenticating the other peer. Pre-shared
keys do not scale well because each IPSec peer must be configured with the
Pre-shared key of every other peer with which it establishes a session. Check
Pre-shared Key
, and enter a group name and password in the designated fields.
•
Certificate
: The digital certificate is a package that contains information such as
a certificate bearer's identity: name or IP address, the certificate's serial number,
the certificate's expiration date, and a copy of the certificate bearer's public key.
The standard digital certificate format is defined in the X.509 specification. The
X.509 version 3 defines the data structure for certificates. Check
Certificate
and
select
Default
.
IKE Authentication Method
•
Client
—
Client request for IP address and server supplies the IP addresses from
the configured address range. Select
Client
and enter the username and password.
•
Network Extension Mode (NEM)
—
Clients propose their subnet for which VPN
services need to be applied on traffic between LAN behind server and subnet
proposed by client. The ezvpn client NEM mode only supports LAN IP 10.0.0.0/8,
172.16.0.0/12, or 192.168.0.0/16. Also, the LAN behind the server and client
should be in a different subnet when in NEM mode. Select
NEM
and select VLANs
from the drop-downs and enter the username and password.
Mode
Select a VLAN.
VLAN
Enter a user name.
User Name
Enter a password.
User Password
Confirm password.
Confirm User Password
For Advanced Settings
Enter the IP address or domain name of the back servers 1, 2 and 3.
When the connection to the primary IPSec VPN server fails, the security appliance can
start the VPN connection to the backup servers. The backup server 1 has the highest
priority and the backup server 3 has the lowest priority.
Backup Server 1, 2 and 3
Enter the time in seconds (Range 30 to 480).
Peer Timeout
Step 5
Click
Apply
.
RV345/345P Administration Guide
90
VPN
Teleworker VPN Client
Summary of Contents for RV340 Series
Page 28: ...RV345 345P Administration Guide 22 Administration Config Management ...
Page 58: ...RV345 345P Administration Guide 52 QoS Switch Queuing ...
Page 68: ...RV345 345P Administration Guide 62 LAN Router Advertisement ...
Page 102: ...RV345 345P Administration Guide 96 VPN VPN Passthrough ...
Page 108: ...RV345 345P Administration Guide 102 Security IP Source Guard ...
Page 110: ...RV345 345P Administration Guide 104 Where To Go From Here Where To Go From Here ...