Configuration
4.10 IPsec Tunnel Configuration
Continued from previous page
Item
Description
Remote Protocol/Port
Specifies Protocol/Port of remote side of the tunnel. The general
form is
protocol
/
port
, for example 17/1701 for UDP (protocol 17)
and port 1701. It is also possible to enter only the number of
protocol, however, the above mentioned format is preferred.
Local ID
Identifier (ID) of local side of the tunnel. It consists of two parts:
a
hostname
and a
domain-name
.
First Local Subnet
IPv4 or IPv6 address of a local network, based on
Tunnel IP
Mode
above.
First Local Subnet
Mask/Prefix
IPv4 subnet mask of a local network, or IPv6 prefix (single num-
ber 0 to 128).
Second Local Subnet
IPv4 or IPv6 address of the second local network, based on
Tun-
nel IP Mode
above. For
IKE Protocol
= IKEv2 only.
Second Local Subnet
Mask/Prefix
IPv4 subnet mask of the second local network, or IPv6 prefix
(single number 0 to 128). For
IKE Protocol
= IKEv2 only.
Local Protocol/Port
Specifies Protocol/Port of a local network. The general form is
protocol
/
port
, for example 17/1701 for UDP (protocol 17) and
port 1701. It is also possible to enter only the number of protocol,
however, the above mentioned format is preferred.
Encapsulation Mode
Specifies the IPsec mode, according to the method of encap-
sulation. You can select the
tunnel
mode in which the entire IP
datagram is encapsulated or the
transport
mode in which only IP
header is encapsulated.
Force NAT Traversal
Enable NAT traversal enforcement (UDP encapsulation of ESP
packets). (
Enabled
).
IKE Protocol
Specifies the version of IKE (IKEv1/IKEv2, IKEv1 or IKEv2).
IKE Mode
Specifies the mode for establishing a connection (
main
or
ag-
gressive
). If you select the aggressive mode, then the router es-
tablishes the IPsec tunnel faster, but the encryption is perma-
nently set to 3DES-MD5.
We recommend that you not use the
aggressive
mode due to lower security!
IKE Algorithm
Specifies the means by which the router selects the algorithm:
•
auto
– The encryption and hash algorithm are selected au-
tomatically.
•
manual
– The encryption and hash algorithm are defined
by the user.
IKE Encryption
Encryption algorithm – 3DES, AES128, AES192, AES256,
AES128GCM128, AES192GCM128, AES256GCM128.
IKE Hash
Hash algorithm – MD5, SHA1, SHA256 or SHA512.
IKE DH Group
Specifies the Diffie-Hellman groups which determine the strength
of the key used in the key exchange process. Higher group num-
bers are more secure, but require more time to compute the key.
Continued on next page
76
UM Configuration OWL LTE M12
Rel. 06.1.09 - 07/2019