
4.
Web Management
AirLive AirMax4GW User’s Manual
100
1.
Key Management:
Select “IKE+Pre-shared Key” or “Manually”. Other
options depend on product models. By default, “IKE+Pre-shared Key”
method is adopted for key management. It is the first key used in IKE
phase for both VPN tunnel initiator and responder to negotiate further
security keys to be used in IPSec phase. The pre-shared key must be the
same for both VPN tunnel initiator and responder. When “Manually” key
management is adopted, the Pre-shared is not necessary.
2.
Local ID:
The Type and the Value of the local Business Security Gateway
must be the same as that of the Remote ID of the remote VPN peer. There
are 4 types for Local ID: User Name, FQDN, User@FQDN and Key ID.
3.
Remote ID:
The Type and the Value of the local Business Security
Gateway must be the same as that of the local ID of the remote VPN peer.
There are also 4 types for Remote ID: User Name, FQDN, User@FQDN
and Key ID.
4.2.3.2.7 IKE Phase
1.
Negotiation Mode:
Choose Main Mode or Aggressive Mode:
Main Mode provides identity protection by authenticating peer identities
when pre-shared keys are used. The IKE SA’s are used to protect the
security negotiations. Aggressive mode will accelerate the establishing
speed of VPN tunnel, but the device will suffer from less security in the
meanwhile. Hosts in both ends of the tunnel must support this mode so as
to establish the tunnel properly.
2.
X-Auth:
For the extended authentication function (XAUTH), the VPN client
(or initiator) needs to provide additional user information to the remote VPN
server
(or Business Security Gateway). The VPN server would reject the connect
request from VPN clients because of invalid user information, even though
the pre-shared key is correct. This function is suitable for remote mobile VPN