4200 User Manual Edgewater Networks, Inc.
Version 3.0 26
VPN Configuration
⇒
Select VPN
The system supports IPsec VPN to protect data communication. This page
allows administrator to define VPN tunnels. VPN Tunnels: List of VPN tunnels.
To edit a VPN tunnel, choose the tunnel name from the list, and the VPN page
will be updated to display the selected tunnel's configuration. To create a new
tunnel, choose New Tunnel from the list.
o Tunnel Name --
The name of the VPN tunnel being edited. The
name must be unique per device. Maximal length of the name is 32
characters.
o Enable Tunnel --
Check this box to enable this tunnel.
o Local VPN Gateway --
WAN IP address of this device.
o Protected Local Network --
The local subnet of this device that is
protected by this tunnel in network/mask or network/bits format, e.g.,
10.10.10.0/24 or 10.10.10.0/255.255.255.0.
o Remote VPN Gateway --
The IP address of the remote VPN
gateway. Must be a static IP address or 0.0.0.0 for any address.
o Remote Protected Network --
The IP address of the remote
subnet protected by the tunnel in network/mask or network/bits
format, e.g., 10.10.10.0/24 or 10.10.10.0/255.255.255.0.
o Tunnel Cipher --
The encryption (AES/3DES)and authentication
(SHA1/MD5) algorithms for this tunnel.
o Key Management --
The IPsec key management protocol.
Supported protocols include IKE main mode, IKE aggressive mode,
and manual key management.
o Authentication --
Authentication methods for IKE negotiation.
Currently supported authentication method includes pre-shared key
authentication.
o Shared Secret --
The shared secret key for IKE authentication.
o IKE SA Lifetime --
The key lifetime IKE SA. Maximum value is 480
minutes (8 hours).
o IPsec SA Lifetime --
The key lifetime for IPsec SA. Maximum value
is 480 minutes (8 hours).
o Forward Perfect Secrecy --
Check this box to enable Perfect
Forward Secrecy for IKE negotiation.