10 Menu VPN
Securepoint 10
Securepoint
Security Solutions
144
10.3 IPSec
This point displays an overview of all native IPSec and L2TP connections.
Here you can adjust the settings of the connections, delete, load, initiate and stop the con-
nections. Furthermore the status of the connection is shown.
10.3.1 Edit Connection
An IPSec connection is divided into two phases.
The first phase negotiates the encryption method and the authentication. The Internet Key
Exchange (IKE) protocol defines, in which way security parameters will be agreed and
shared keys will be exchanged.
The second phase creates new key material irrespective of the previous keys. So no one can
gather the new key from the previous key.
10.3.1.1 Phase 1
In these settings the basic connection parameters are stored.
name
description
tab General
Local gateway ID
ID of the appliance.
If you use the interface ppp0/eth0 the firewall ID is the IP-address
of the interface. You can insert the hostname as well (also the
DynDNS name).
Remote host/gateway
remote VPN gateway or host (Name or IP-address)
Remote host/gateway
ID
remote VPN gateway or host (Name or IP-address)
Enter the certificate of the remote host, if the connection uses
certificates for authentication.
Authentication
Shows which authentication method is used.
Key (PSK) or certificate.
Local key/ Local Certif-
icate
Depending on the authentication method, enter the local key
(PSK) or the name of the certificate.
Start automatically
Activate only for site-to-site connections.
Dead peer detection
This functions recognizes, if the connection aborted unexpectedly.
If an abort is recognized, the tunnel will be shut down completely
to guarantee a new link connection.
DynDNS name
Mark this checkbox, if the remote host uses a DynDNS service.