SMARTRG INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. COPYRIGHT © 2016
97
Field Name
Description
IPSec Connection Name
Enter a descriptive name for this connection
IP Version
Select the IP version associated with your infrastructure. Options are
IPv4
and
IPv6
.
Tunnel Mode
Select the encapsulation method to be used. Options are:
l
AH
: Use this mode to encapsulate a packet with AH and IP headers. For
authentication, the entire packet is signed.
l
ESP
: Use this mode to encapsulate a packet with ESP and IP headers. An
ESP trailer is added to the packet for authentication and integrity.
Local Gateway Interface
Select the WAN connection to be associated with this tunnel.
Remote IPSec Gateway Address
Enter the WAN IP for this tunnel.
Tunnel Access From Local IP
Addresses
Select IP information for site A and B. Options are:
l
Subnet
: Allows access to the entire LAN.
l
Single Address
: For single host, select this option.
IP Address for VPN
Enter the IP address used for local access.
Mask or Prefix Length
Enter the subnet mask or prefix length for IP address entered for local access.
The default is
255.255.255.0
.
Tunnel Access From Remote IP
Addresses
Select IP information for site A and B. Options are:
l
Subnet
: Allows access to the entire LAN.
l
Single Address
: Allows access to a single host.
IP Address for VPN
Enter the IP address used for remote access.
Mask or Prefix Length
Enter the subnet mask or prefix length for IP address entered for remote access.
The default is
255.255.255.0
.
Key Exchange Method
Select the key-exchange method to be used for IPSec. Options are:
l
Auto(IKE)
: This method uses the negotiated key-exchange method for
IPSec. This is the default and recommended for best results.
l
Manual
: This method requires that you configure the details.
Authentication Method
Select the method by which the remote end will authenticate.
l
Pre-Shared Key
: A key is distributed to authorized users for logging into
the system. Enter the key in the
Pre-Shared Key
field.
l
Certificate (X.509)
: A certificate is used for authentication. Select the
certificate file in the
Certificates
field that appears.
Perfect Forward Secrecy
Select whether a session key is derived from a set of long-term keys is com-