4. CONFIGURATION
Continued from previous page
Item
Description
CA Certificate
Certificate for X.509 authentication.
Remote Certificate
Certificate for X.509 authentication.
Local Certificate
Certificate for X.509 authentication.
Local Private Key
Private key for X.509 authentication.
Local Passphrase
Passphrase used during private key generation.
Extra Options
Specifies the additional parameters of the IPsec tunnel for exam-
ple, secure parameters.
Table 40: IPsec Tunnel Configuration
The IPsec function supports the following types of identifiers (ID) for both sides of the
tunnel,
Remote ID
and
Local ID
parameters:
•
IP address (for example, 192.168.1.1)
•
DN (for example, C=CZ,O=Conel,OU=TP,CN=A)
•
FQDN (for example, @director.conel.cz) –
the @ symbol proceeds the FQDN.
•
User FQDN (for example, [email protected])
The certificates and private keys have to be in the PEM format. Use only certificates containing
start and stop tags.
The random time, after which the router re-exchanges new keys is defined as follows:
Lifetime - (Rekey random value in range (from 0 to Rekey margin * Rekey Fuzz/100))
The default exchange of keys is in the following time range:
•
Minimal time: 1h - (9m + 9m) = 42m
•
Maximal time: 1h - (9m + 0m) = 51m
We recommend that you maintain the default settings. When you set key exchange times
higher, the tunnel produces lower operating costs, but the setting also provides less security.
Conversely, when you reducing the time, the tunnel produces higher operating costs, but
provides for higher security.
The changes in settings will apply after clicking the
Apply
button.
64
Содержание SPECTRE V3
Страница 1: ...Configuration Manual for v3 Routers ...
Страница 22: ...3 STATUS Figure 4 WiFi Scan 13 ...
Страница 32: ...4 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 23 ...
Страница 37: ...4 CONFIGURATION Figure 19 Example of VRRP configuration backup router 28 ...
Страница 44: ...4 CONFIGURATION Figure 20 Mobile WAN Configuration 35 ...
Страница 51: ...4 CONFIGURATION Figure 25 WiFi Configuration 42 ...
Страница 74: ...4 CONFIGURATION Figure 39 IPsec Tunnels Configuration 65 ...
Страница 105: ...4 CONFIGURATION Figure 63 Example 2 USB port configuration 96 ...