IPSec
Manual Key VPN |
VPN Name
|
Name of the VPN.
|
Enter a name.
|
Remote gateway
|
Name of the remote gateway.
|
Select a name.
|
External Interface
|
Outgoing interface.
|
Select an interface.
|
Protocol
|
Security protocol for this VPN.
|
Select a protocol.
|
Spi
|
The security parameter index. An arbitrary value that uniquely
identifies which security association (SA) to use at the receiving
host (the destination address in the packet).
|
Enter a value from 256 through 16,639.
|
Authentication |
Algorithm
|
Hash algorithm that authenticates packet data. It can be one
of the following:
- hmac-md5-96—Produces a 128-bit digest.
- hmac-sha1-96—Produces a 160-bit digest.
|
Select an algorithm.
|
Key
|
Type of authentication. It can be one of the following:
- None
- ascii-text—ASCII text key. For hmac-md5-96, the
key is 16 ASCII characters; for hmac-sha1-96, the key is 20 ASCII
characters.
- hexadecimal—Hexadecimal key. For hmac-md5-96, the
key is 32 hexadecimal characters; for hmac-sha1-96, the key is 40
hexadecimal characters.
|
Select none, or select the type of key and enter it
in the appropriate format.
|
Encryption |
Algorithm
|
Supported Internet Key Exchange (IKE) proposals include the
following:
-
3des-cbc—3DES-CBC encryption algorithm.
-
aes-128-cbc—AES-CBC 128-bit encryption
algorithm.
-
aes-192-cbc—AES-CBC 192-bit encryption
algorithm.
-
aes-256-cbc—AES-CBC 256-bit encryption
algorithm.
-
des-cbc—DES-CBC encryption algorithm
|
Select an encryption algorithm.
|
Key
|
Type of encryption key. It can be one of the following:
- None
- ascii-text—ASCII text key. For hmac-md5-96, the
key is 16 ASCII characters; for hmac-sha1-96, the key is 20 ASCII
characters.
- hexadecimal—Hexadecimal key. For hmac-md5-96, the
key is 32 hexadecimal characters; for hmac-sha1-96, the key is 40
hexadecimal characters.
|
Select none, or select the type of key and enter it
in the appropriate format.
|
Bind to tunnel interface
|
The tunnel interface to which the route-based virtual private
network (VPN) is bound.
|
Select an interface.
|
Don’t Fragment bit
|
Specifies how the router handles the Don’t Fragment (DF)
bit in the outer header.
- clear—Clear (disable) the DF bit from the outer
header. This is the default.
- copy—Copy the DF bit to the outer header.
- set—Set (enable) the DF bit in the outer header.
|
Choose an option.
|
Enable VPN monitor
|
Allows for monitoring of the VPN.
|
Click the check box.
|
Destination ip
|
IP address of the destination peer.
|
Enter an IP address.
|
Optomized
|
Specify that the router uses traffic patterns as evidence of
peer liveliness. If enabled, ICMP requests are suppressed. This feature
is disabled by default.
|
Click the check box.
|
Source interface
|
The source interface for monitor messages.
|
Enter a source interface name.
|