
4: Network Settings
UM Configuration BAT-C2
107
Release 01.0.00 04/2019
To Configure ARP Network Stack Settings
Using Web Manager
To configure ARP protocol settings, on the
Network
page, click
Protocol Stack
>
ARP
.
Using XML
Include in your file:
<configgroup name=”arp”>
VPN
Access VPN statistics and configuration options on this page.
VPN Setting
Description
Statistics
Show details
Click this link to view the VPN log.
Configuration
Name
Enter the name of this VPN connection.
State
Select to enable or disable the VPN connection.
Connection Type
Select connection type in the drop-down menu:
Host to Host
- VPN tunnel for Local and Remote subnets are fixed.
Host to Subnet
- VPN tunnel for Remote subnet area is dynamic and
Local subnet is fixed.
IKEv2
Select the IKE version 2 settings to be used. The acceptable values are:
Permit
: (the default) signifying no IKEv2 should be transmitted, but will be
accepted if the other ends initiates to us with IKEv2.
Never
: signifying no IKEv2 negotiation should be transmitted or accepted.
Propose
: signifying that the BAT-C2 will permit IKEv2, and also use it as
the default to initiate.
Insist
: signifying that the BAT-C2 will only accept and receive IKEv2 and
IKEv1 negotiations will be rejected.
Authentication Mode
Select the authentication mode of IPSec VPN.
PSK
(Pre-shared Key) is used when there is a single key common to both
ends of the VPN.
RSA
uses RSA digital signatures.
XAUTH
provides an additional level of authentication by allowing the
IPSec gateway to request extended authentication from remote users,
thus forcing remote users to respond with their credentials before being
allowed access to the VPN.
Mode Configuration
Select to enable or disable extended authentication operation and the
settings provided to the client during the configuration exchange.
Type
Select
Tunnel
or
Transport
type from the drop-down menu. Tunnel Mode is
used for protecting traffic between different networks, when traffic must pass
through an intermediate, untrusted network. Transport Mode is used for end-
to-end communications (for example, for communications between a client
and a server).
Table 4-16 VPN