Proroute GEM420 4G M2M Router
GEM420 User Manual
126
1.
Negotiation Mode:
Choose Main Mode or Aggressive Mode:
Main Mode provides identity protection by authenticating peer identities when
pre-shared keys are used. The IKE SA’s are used to protect the security
negotiations. Aggressive mode will accelerate the establishing speed of VPN
tunnel, but the device will suffer from less security in the meanwhile. Hosts in
both ends of the tunnel must support this mode so as to establish the tunnel
properly.
2.
X-Auth:
For the extended authentication function (XAUTH), the VPN client (or
initiator) needs to provide additional user information to the remote VPN server
(or Business Security Gateway). The VPN server would reject the connect
request from VPN clients because of invalid user information, even though the
pre-shared key is correct. This function is suitable for remote mobile VPN clients.
You can not only configure a VPN rule with a pre-shared key for all remote users,
but you can also designate account / password for specific users that are
permitted to establish VPN connection with VPN server. There are 3 roles to let
Business Security Gateway behave as for X-Auth authentication, including None,
Server and Client. For None role, there is no X-Auth authentication happens
during VPN tunnel establishing. For Server role, click “X-Auth Account” button to
modify 10 user accounts for user validation during tunnel establishing to VPN
server. Finally, for Client role, there are two additional parameters to fill: “User
Name” and “Password” for valid user to initiate that tunnel.
3.
Dead Peer Detection:
This feature will detect if remote VPN peer still exists.
Delay indicates the interval between detections, and Timeout indicates the
timeout of detected to be dead.
4.
Phase 1 Key Life Time
: The value of life time represents the life time of the key
which is dedicated at Phase 1 between both end gateways.
3.2.3.1.8 IKE Proposal Definition