
Configuring IPsec VPN Settings
58
BODi rS BD1000 User Manual
4 • Configuring the WAN
Viewing the IPsec Status
The
IPsec Status
section shows the current connection status of each connection profile. To view more details
about a VPN connection status, navigate to the
Status > IPsec
page.
Pre-Shared Key
Defines the pre-shared key used for this particular VPN connection. The
VPN connection's session key will be further protected by the pre-shared
key. The connection will be up only if the pre-shared keys on each side
match.
Local ID
Under Main Mode, this field can be left blank.
Under Aggressive Mode, if Remote Gateway IP Address field is filled on
this end and the peer end, this field can be left blank. Otherwise, this field
is typically a U-FQDN.
Remote ID
Under Main Mode, this field can be left blank.
Under Aggressive Mode, if Remote Gateway IP Address field is filled on
this end and the peer end, this field can be left blank. Otherwise, this field
is typically a U-FQDN.
Phase 1 (IKE) Proposal
Under Main Mode, this allows the setting of up to 6 encryption standards,
in descending order of priority, to be used in the initial connection key
negotiations. For Aggressive Mode, only one selection is permitted.
Phase 1 DH Group
This is the Diffie-Hellman group used within IKE. This allows two parties to
establish a shared secret over an insecure communications channel. The
larger the group number, the higher the security.
•
Group 2 - 1024-bit is the default value.
•
Group 5 - 1536-bit is the alternative option.
Phase 1 SA Lifetime
Specifies the lifetime limit of this Phase 1 Security Association.
Default = 3600 seconds
Phase 2 (ESP) Proposal
Under Main Mode, this allows the setting of up to 6 encryption standards,
in descending order of priority, to be used for the IP data that is being
transferred.
For Aggressive Mode, only one selection is permitted.
Phase 2 PFS Group
The Perfect Forward Secrecy (PFS) ensures that if a key was compromised,
the attacker will be able to access only the data protected by that key but
not any other data.
•
None - Do not request for PFS when initiating connection. However,
since there is no valid reason to refuse PFS, the system will allow the
connection to use PFS if requested by the remote peer. This is the
default value.
•
Group 2 - 1024-bit Diffie-Hellman group. The larger the group number,
the higher the security.
•
Group 5 - 1536-bit is the third option.
Phase 2 SA Lifetime
Specifies the lifetime limit of this Phase 2 Security Association.
Default = 28800 seconds
Table 24. IPsec VPN: New Connection Settings
Field
Description