Configuring an IPsec Policy—Dynamic VPNs
You can use J-Web to quickly configure an IPsec policy.
Before You Begin |
---|
For background information, read:
|
To configure an IPsec policy:
- Select Configure>IPSec VPN>Dynamic VPN>IPsec Autokey.
- Select the IPsec Policy tab if it is not already selected.
- To modify an existing policy, click the appropriate link
in the Name column to go to the policy’s
configuration page. Or, select the policy from among those listed
and click one of the following buttons:
- To apply the configuration, click Apply.
- To delete the configuration, click Delete.
- To configure a new IPsec policy, click Add.
- Fill in the options as described in Table 90.
- Click one of the following buttons:
- To apply the configuration, click OK.
- To cancel the configuration and return to the main Configuration page, click Cancel.
Table 90: IPsec Policy Configuration Options
Field | Function | Action |
---|---|---|
IPsec Policy | ||
Name | Name to identify the policy. | Enter a name. |
Description | Description of the policy. | Enter a brief description of the policy. |
Perfect Forward Secrecy | Method the device uses to generate the encryption key. Perfect Forward Secrecy generates each new encryption key independently from the previous key.
| Select a method. |
Proposal | ||
None | Do not use a proposal. | Click None. |
User Defined | Use up to four Phase 2 proposals that you previously defined. If you include multiple Phase2 proposals in the IPsec policy, use the same Diffie-Hellman group in all of the proposals. | Click User Defined, select a proposal (or proposals) from the pop-up menu, and click Add. |
Predefined | Use one of the following types of predefined Phase 1 proposals:
| Click Predefined, and select a proposal type. |