
Encapsulation and Packet Handling
3-2
Hewlett-Packard Company Virtual Private Networking Concepts Guide
Secure Profiles
Secure Profiles
Secure Profiles
Secure Profiles
Secure profiles are used to define how packets are encrypted
when passing through a tunnel and how the establishment of the
communication session is authenticated. Secure profiles must
contain the following information to be complete.
Name
Name
Name
Name
The name is a descriptive alphanumeric string used to reference
the secure profile when it is applied to a tunnel. Although no
naming convention is imposed, it is wise to define one prior to
creating your profiles. Suggested naming conventions indicate
either the intended use of the profile (for example, Interoffice or
Dial-up user), the relative strength of the profile (for example,
Strict or Very Strict), or the contents of the profile (for example,
ESP-3DES-K1024-C12HRS for ESP encapsulation, 3DES,
authentication key with 1024-bit public keys, and a crypto period
of 12 hours).
Algorithm
Algorithm
Algorithm
Algorithm
The algorithm can be set to Data Encryption Standard (DES),
Triple Pass DES, 3DES, or 40-bit DES for ESPv2 (IPSec) tunnels.
Keepalive
Keepalive
Keepalive
Keepalive
The keepalive interval can be set between 1 and 299 seconds or
disabled (0). The keepalive feature is usually specified in profiles
that are applied to remote links and has two main uses. The first
is to ensure that the link status displayed on the remote VPN
device accurately reflects the status of the tunnel. The second is
to ensure that other VPN devices can sense that a remote device
has dropped its connection and therefore the tunnel must be
renegotiated. Note that setting the keepalive to a small value
causes many keepalive packets to be sent. This may impact the
responsiveness of the remote connection.
Timeout
Timeout
Timeout
Timeout
The keepalive timeout can be set between 2 and 300 seconds.
This specifies how long a VPN device should wait for a packet
from an opposing VPN device before declaring the session
terminated and attempting to renegotiate the tunnel. If you
specify a timeout on one end of a tunnel, you must specify a
keepalive on the other end of the tunnel.