4. CONFIGURATION
Continued from previous page
Item
Description
IKE Lifetime
Lifetime key service part of tunnel. The minimum value of this
parameter is 60 s. The maximum value is 86400 s.
Rekey Margin
Specifies how long before connection expiry should attempt to
negotiate a replacement begin. Maximum value must be less
than half of IKE and Key Lifetime parameters.
Rekey Fuzz
Percentage extension of Rekay Margin time
DPD Delay
Time after which the IPsec tunnel functionality is tested
DPD Timeout
The period during which device waits for a response
Authenticate Mode
Using this parameter can be set authentication:
•
Pre-shared key
– sets the shared key for both sides of the
tunnel
•
X.509 Certificate
– allows X.509 authentication in multi-
client mode
Pre-shared Key
Shared key for both sides for Pre-shared key authentication
CA Certificate
Certificate for X.509 authentication
Remote Certificate
Certificate for X.509 authentication
Local Certificate
Certificate for X.509 authentication
Local Private Key
Private key for X.509 authentication
Local Passphrase
Passphrase for X.509 authentication
Extra Options
Use this parameter to define additional parameters of the IPsec
tunnel, for example secure parameters etc.
Table 37: IPsec tunnel configuration
IPsec supports the following types of identifiers (ID) of both tunnel sides (
Remote ID
and
Local ID
items):
•
IP address (e.g. 192.168.1.1)
•
DN (e.g. C=CZ,O=Conel,OU=TP,CN=A)
•
FQDN (e.g. @director.conel.cz) –
in front of FQDN must always be @
•
User FQDN (e.g. [email protected])
The certificates and private keys have to be in PEM format. As certificate it is possible to
use only certificate which has start and stop tag certificate.
53
Содержание V3
Страница 1: ...Configuration Manual for v3 Routers ...
Страница 17: ...3 STATUS Figure 2 Mobile WAN status 8 ...
Страница 20: ...3 STATUS Figure 4 WiFi Scan 11 ...
Страница 29: ...4 CONFIGURATION Figure 11 Example 1 Topology of LAN Configuration Figure 12 Example 1 LAN Configuration 20 ...
Страница 37: ...4 CONFIGURATION Figure 17 Mobile WAN configuration 28 ...
Страница 64: ...4 CONFIGURATION Figure 36 IPsec tunnels configuration 55 ...
Страница 76: ...4 CONFIGURATION Figure 47 Example of the MIB browser Figure 48 Example of SNMP configuration 67 ...
Страница 91: ...4 CONFIGURATION Figure 59 Example 2 USB port configuration 82 ...