communications mechanism for data and IP information that is transmitted between networks. A VPN can
also be used over an existing network, such as the Internet, to facilitate the secure transfer of sensitive data
across public networks.
VPNs can also provide flexible solutions, such as securing communications between remote telecommuters
and the organizations, regardless of where the telecommuters are located. A VPN can even be established
within a single network to protect sensitive communications from other parties on the same network.
The next sections cover the IPSec Profiles, Site-to-Site and Client-to Site.
IPSec Profiles
The IPSec profile is the central configuration in IPSec that defines most of the IPSec parameters such as the
protocol (Encapsulation Security Payload, Authentication Header), mode (tunnel, transport), algorithms
(encryption, integrity, Diffie-Hellman), perfect forward secrecy (PFS), SA lifetime, and key management
protocol (IKEv1, IKEv2).
The IPSec profiles contain information related to the algorithms such as encryption, authentication, and DH
group for Phase I and II negotiations in auto mode. These profiles also contain keys for corresponding
algorithms in case keying mode is manual.
To configure the IPSec Profiles, follow these steps:
Step 1 Select VPN > IPSec VPN > IPSec Profiles.
Step 2 In the IPSec Profiles table, click Add.
Step 3 Enter a profile name and select the keying mode.
Step 4 For auto keying mode, select the IKE Version.
Step 5 In the Phase 1 Options section, configure the following:
DH is a key exchange protocol, with two groups of different prime key lengths, 1,024
bits and 1,536 bits. Select an option from the drop-down list.
Diffie-Hellman (DH) Group
Select an encryption option (3DES, AES-128, AES-192, or AES-256) from the
drop-down list. This method determines the algorithm used to encrypt or decrypt
ESP/ISAKMP packets.
Encryption
The authentication method determines how the Encapsulating Security Payload Protocol
(ESP) header packets are validated. The MD5 is a one-way hashing algorithm that
produces a 128-bit digest. The SHA1 is a one-way hashing algorithm that produces a
160-bit digest. The SHA1 is recommended because it is more secure. Make sure that
both ends of the VPN tunnel use the same authentication method. Select an
authentication (MD5, SHA1, or SHA2-256).
Authentication
Amount of time an IKE SA is active in this phase. (Range 120 to 86400, Default 28800).SA Lifetime
Step 6 In the Phase 2 Options section, configure the following:
Select a protocol from the drop-down list.
• ESP: Select ESP for data encryption and enter the encryption.
• AH: Select this for data integrity in situations where data is not secret but must
be authenticated.
Protocol Selection
RV260x Administration Guide
92
VPN
IPSec Profiles