Adding and Editing VPN Sites
Chapter 16: Working with VPNs
381
In this field…
Do this…
Certificate
Select this option to use a certificate for VPN authentication.
If you select this option
,
a certificate must have been installed. (Refer to
Installing a Certificate
on page 386 for more information about
certificates and instructions on how to install a certificate.)
Table 96: VPN Authentication Fields
In this field…
Do this…
Topology User
Type the topology user’s user name.
Topology
Password
Type the topology user’s password.
Use Shared
Secret
Type the shared secret to use for secure communications with the VPN
site.
This shared secret is a string used to identify the VPN sites to each other.
The secret can contain spaces and special characters.
Table 97: Security Methods Fields
In this field…
Do this…
Phase 1
Security Methods
Select the encryption and integrity algorithm to use for IKE negotiations:
Automatic.
The IP60 appliance automatically selects the best
security methods supported by the site. This is the default.
A specific algorithm
Diffie-Hellman
group
Select the Diffie-Hellman group to use:
Automatic.
The IP60 appliance automatically selects a group.
This is the default.
A specific group
A group with more bits ensures a stronger key but lowers performance.
Summary of Contents for IP60 - Security Appliance
Page 1: ...Part No N450000643 Rev 001 Published February 2008 Nokia IP60 Security Appliance User Guide ...
Page 4: ...4 Nokia IP60 Security Appliance User Guide ...
Page 10: ......
Page 12: ......
Page 38: ......
Page 58: ......
Page 108: ......
Page 268: ......
Page 482: ......