ICX35-HWC ♦ Industrial Cellular Gateway
ICX35-HWC Webpage
3G/4G LTE
User Manual
ProSoft Technology, Inc.
Page 35 of 127
IPSec
The VPN Tunnel Internet Protocol Security (IPsec) feature consists of protocols used
for authentication and encryption.
Important: IPSec tunnel does not work with Public Dynamic IP’s and DDNS names.
The
IPSec
option from the
Client
drop-down list displays the following parameters:
Parameter
Description
Local Identifier
Specifies the identifier to be used for the local side of the IPsec connection.
This is used during authentication of the tunnel. It is a free-form string,
although typically it is a Fully Qualified Domain Name, or an IP address. Max
length is 28.
Note: Use the “@” prefix when the IPSec tunnel is established between two ICX35-
HWC’s. Example: @ICX35_local (This may be the local Module Name. If you are
establishing an IPSec tunnel with a network router that supports IPSec, no “@”
prefix is needed).
Remote Host
Specifies the IPsec remote IP address.
Remote Identifier
Specifies the identifier to be used for the remote site of the IPsec connection.
This is used during authentication of the tunnel. It is a free-form string,
although typically, it is a FQDN name, or an IP address. Max length is 28.
Note: Use the “@” prefix when the IPSec tunnel is established between two ICX35-
HWC’s. Example: @ICX35_remote (This may be the remote Module Name. If you
are establishing an IPSec tunnel with a network router that supports IPSec, no “@”
prefix is needed).
Remote Subnet IP
Specifies the subnet address block on the LAN side of the remote peer. This
parameter must be specified in the CIDR notation (i.e., a number from 1 to 32).
Remote Subnet Mask
Specifies the subnet mask on the LAN side of the remote peer.
Pre-shared Key
Specifies the pre-shared key that must match between both ends of the VPN
tunnel.
IPSec authenticates and encrypts each IP packet of a communication session. IPSec
also includes protocols for establishing mutual authentication between agents at the
beginning of the session and negotiation of cryptographic keys to be used during the
session. This is an end-to-end security scheme operating in the internet layer of the
Internet Protocol Suite.
The following table lists the IPSec default values:
Parameter
Default Value
Type
Tunnel
Aggressive Mode
Undefined (Default: No)
Phase 1/2 Algorithms
Undefined (Default opportunistic - use remote proposal)