SMARTRG INC. PROPRIETARY AND CONFIDENTIAL. ALL RIGHTS RESERVED. COPYRIGHT © 2016 97
Field Name Description
IPSec Connection Name Enter a descriptive name for this connection
IP Version Select the IP version associated with your infrastructure. Options are IPv4 and
IPv6.
Tunnel Mode Select the encapsulation method to be used. Options are:
l AH: Use this mode to encapsulate a packet with AH and IP headers. For
authentication, the entire packet is signed.
l ESP: Use this mode to encapsulate a packet with ESP and IP headers. An
ESP trailer is added to the packet for authentication and integrity.
Local Gateway Interface Select the WAN connection to be associated with this tunnel.
Remote IPSec Gateway Address Enter the WAN IP for this tunnel.
Tunnel Access From Local IP
Addresses
Select IP information for site A and B. Options are:
l Subnet: Allows access to the entire LAN.
l Single Address: For single host, select this option.
IP Address for VPN Enter the IP address used for local access.
Mask or Prefix Length Enter the subnet mask or prefix length for IP address entered for local access.
The default is
255.255.255.0
.
Tunnel Access From Remote IP
Addresses
Select IP information for site A and B. Options are:
l Subnet: Allows access to the entire LAN.
l Single Address: Allows access to a single host.
IP Address for VPN Enter the IP address used for remote access.
Mask or Prefix Length Enter the subnet mask or prefix length for IP address entered for remote access.
The default is
255.255.255.0
.
Key Exchange Method Select the key-exchange method to be used for IPSec. Options are:
l Auto(IKE): This method uses the negotiated key-exchange method for
IPSec. This is the default and recommended for best results.
l Manual: This method requires that you configure the details.
Authentication Method Select the method by which the remote end will authenticate.
l Pre-Shared Key: A key is distributed to authorized users for logging into
the system. Enter the key in the Pre-Shared Key field.
l Certificate (X.509): A certificate is used for authentication. Select the
certificate file in the Certificates field that appears.
Perfect Forward Secrecy Select whether a session key is derived from a set of long-term keys is com-