DEFINING TUNNELS
MultiConnect
®
rCell 100 MTR-EV3 User Guide 65
IPsec Tunnel Configuration Field Descriptions
Field Description
IPSec Tunnel
Name Name used to identify the IPsec tunnel in configurations and logs.
Description Optional text to describe the IPsec tunnel. This description shows up in
the UI while hovering over the summary of an IPsec tunnel.
IPSec Remote Tunnel Endpoint
Remote WAN IP External IP address of the remote tunnel endpoint. The remote device is
typically another router.
Saved Network Select a saved network from the pre-defined list of user-defined
networks on the Setup > Saved Networks page. This network describes
the remote endpoint's subnet, and is used to identify packets that are
routed over the tunnel to the remote network.
Remote Network Route This field is used in conjunction with the Remote Network Mask field
and describes the remote endpoint's subnet. This is used to identify
packets that are routed over the tunnel to the remote network.
Remote Network Mask This field is used in conjunction with the Remote Network Route field,
to describe the remote endpoint's subnet. It identifies packets that are
routed over the tunnel to the remote network.
Tunnel Type Internet Key Exchange (IKE) for host-to-host, host-to-subnet, or subnet-
to-subnet tunnels. Choose from IKE or IKEv2.
IPsec Tunnel: IKE
Authentication Method Choose between Pre-Shared Key or RSA Signatures. Authentication is
performed using secret pre-shared keys and hashing algorithms (like
SHA1 MD5) or RSA signatures (you provide the CA Certificate, Local RSA
Certificate, and Local RSA Private Key in .pem format). If you check
Enable UID, then Local ID and Remote ID become available as options.
Pre-Shared Key Authentication is performed using a secret pre-shared key and hashing
algorithms on both sides.
Secret Secret key that is known by both endpoints.
Encryption Method IKE encryption algorithm used for the connection (phase 1 - ISAKMP SA).
Based off of phase 1, a secure set of defaults are used for phase 2,
unless the Advanced option is used, in which case, all components of
both phases 1 and 2 are specified by the user.
RSA Signatures Authentication is performed using digital RSA signatures.
CA Certificate Certificate Authority certificate used to verify the remote endpoint's
certificate.
Local RSA Certificate Certificate the local endpoint uses during Phase 1 Authentication.
Local RSA Private Key The private key that the local endpoint uses during Phase 1
Authentication.