You can use J-Web Quick Configuration to quickly configure IPsec AutoKey.
Before You Begin |
---|
For background information, read:
|
Figure 34 shows the Quick Configuration page where you can select an existing policy, or click Add to create a new one.
Figure 34: IPsec Autokey Quick Configuration Page – Adding an Autokey VPN
Figure 35 shows the Quick Configuration page where you create a new IPsec AutoKey.
Figure 35: IPsec Autokey Quick Configuration Page – Configuring an Autokey VPN
To configure an IPsec AutoKey with Quick Configuration:
Table 181: IPsec AutoKey Configuration Options
Field |
Function |
Action |
---|---|---|
IPsec Autokey VPN | ||
VPN Name |
Name to identify the IPsec AutoKey. |
Enter a name. |
Remote gateway |
IKE gateway to associate with the IPsec AutoKey. An IKE gateway specifies a variety of IKE configuration options, including which IKE policy to use, how to identify endpoint computers during IKE exchanges, NAT options, dead peer detection options, and Xauth options. |
Select a previously created IKE gateway. |
Idle time |
Maximum amount of time to allow a security association (SA) to remain idle before deleting it. |
Specify a value between 60 and 999,999 seconds. |
Install interval |
Maximum number of seconds to allow the installation of a rekeyed outbound SA on the device. |
Specify a value between 0 and 10 seconds. |
IPsec policy |
IPsec policy to associate with the IPsec AutoKey. An IPsec policy specifies the Diffie-Hellman group to use when generating encryption keys as well as the Phase 2 proposals to use. |
Select a previously created IPsec policy. |
Disable anti replay |
Replay attacks occur when somebody intercepts a series of packets and uses them to flood the system or gain entry into a trusted system. Select this option to enable replay protection. |
Click the check box to disable or enable. (Disabled by default.) |
Use proxy identity |
(Optional) Specify the IPsec proxy identity to use in IKE negotiations. The default behavior is to use the identities taken from the firewall policies. |
Click the check box to disable or enable. (Disabled by default.) |
Local IP/Netmask |
Local IP address and subnet mask for the proxy identity. |
Enter an IP address and subnet mask. |
Remote IP/Netmask |
Remote IP address and subnet mask for the proxy identity. |
Enter an IP address and subnet mask. |
Service |
Service (port and protocol combination) to protect. |
Select a service. |
Don't fragment bit |
Specify how the device should handle the Don't Fragment (DF) bit in the outer header.
|
Choose an option. |
Establish tunnels |
Specify when to activate IKE:
|
Choose an option. |