You can use J-Web Quick Configuration to quickly configure an IKE gateway.
Before You Begin |
---|
For background information, read
|
To configure an IKE gateway with J-Web Quick Configuration:
Table 164: IKE Gateway and Peer Authentication Options
Field |
Function |
Action |
---|---|---|
IKE Gateway | ||
Name |
Name of the destination peer gateway, specified as an alphanumeric string |
Enter a name. |
IKE Policy |
The IKE policy to be used for communication with the destination peer gateway. |
Select the IKE policy to use for the peer gateway |
External Interface |
Name of the interface to be used to send traffic to the IPsec VPN. |
Specify the outgoing interface for IKE SAs. This interface is associated with a zone that acts as its carrier, providing firewall security for it. |
Site to Site Tunnel or Client Tunnel |
The type of tunnel to be used. If Site to Site, you must also enter Address/FDQN. If Client, you must also enter Connections Limit and IKE user type. |
Select the Site to Site Tunnel or Client Tunnel button. |
Address/FQDN (Site to Site) |
Static address or hostname of remote peer. |
Specify one primary and up to four backups. |
Local ID |
The local IKE identity to send in the exchange with the destination peer so that the destination peer can communicate with the local peer. If you do not configure a local-identity, the device uses the IP address corresponding to the local endpoint.You can identify the local identity in either of the following ways:
|
Specify an IP address, hostname, user-at-hostname, or distinguished name. |
Connections limit (Client Tunnel) |
Maximum number of concurrent connections allowed. |
Specify the maximum number of concurrent users that can be connected to the gateway. When the maximum number of connections is reached, no more dynamic VPN endpoint dial-up users attempting to access an IPsec VPN are allowed to begin Internet Key Exchange (IKE) negotiations. |
IKE user type (Client Tunnel) |
|
Select the type of IKE user for a remote access connection. |
Remote id type |
Type of identifier for remote peer. |
Select IP Address, Hostname, User at hostname, or Distinguished name. |
IP Address |
Use an IPv4 IP address to identify the dynamic peer. |
Enter an IP address. |
Hostname |
Use a fully qualified domain name (FQDN) to identify the dynamic peer. |
Select and enter the FQDN. |
User at hostname |
Use an e-mail address to to identify the dynamic peer. |
Select and enter the remote identity as an e-mail address. |
Distinguished name |
Use a distinguished name to identify the dynamic peer. The distinguished name appears in the subject line of the Public Key Infrastructure (PKI) certificate. For example: Organization: juniper, Organizational unit: slt, Common name: common. |
Select and specify a container or a wildcard. |
container |
The distinguished name of the remote peer. |
Enter the distinguished name string exactly as it appears in the certificate. |
wildcard |
All or part of the distinguished name of the remote peer. |
Enter all or parts of a distinguished name, in any order. |
Dead Peer Detection | ||
Local Identity |
Enter the local identity for the tunnel. |
Enter the local identity |
Always Send |
Instructs the device to send dead peer detection (DPD) requests regardless of whether there is outgoing IPsec traffic to the peer. |
Click the check box. |
Interval |
The amount of time that the peer waits for traffic from its destination peer before sending a dead peer detection (DPD) request packet. |
Enter the interval at which to send DPD messages. Range: 1 through 60 seconds. |
Threshold |
The maximum number of unsuccessful dead peer detection (DPD) requests that can be sent before the peer is considered unavailable. |
Enter the maximum number of unsuccessful DPD requests to be sent. Range: 1 through 5. Default: 5. |
XAuth |
Provides extended authentication (XAuth), in addition to IKE authentication for remote users trying to access a VPN tunnel. |
Select a previously created access profile to reference for authentication information. |
Enable/Disable NAT Traversal |
Enables or Disables UDP encapsulation of IPsec Encapsulating Security Payload (ESP) packets, otherwise known as Network Address Translation Traversal (NAT-T). NAT-T is enabled by default. |
Click the appropriate button to disable or enable. |