IPsec Policy Settings
IPsec Settings > IPsec Policy List > IPsec Policy Settings

Use this tab to edit the IPsec policy.

IP Policy Settings

To Top

No.

Specify the order of the IPsec policy by selecting number (1-10) in IPsec Policy List.

Activity

Specify whether this IPsec policy is active or inactive.

Name

Enter the name of the IPsec policy, using up to 16 alphanumeric characters.

Address Type

Select an address type to be used for IPsec communication.

Local Address

Specify the address of the machine.

Remote Address

Enter the address of the destination.

Prefix Length

Enter the prefix length of the address specified for Remote Address. The prefix length must be in the range of 1 to 32 for IPv4, or 1 to 128 for IPv6, as shown in the following tables:

IPv4

IP address Prefix Length Address range
192.168.1.1 32 192.168.1.1 only
192.168.5.0 24 192.168.5.0 to 192.168.5.255

IPv6

IP address Prefix Length Address range
2001:1000:0:1234::1 128 2001:1000:0:1234::1 only
2001:1000:0:1234:: 80 2001:1000:0:1234:: to 2001:1000:0:1234:ffff:ffff:ffff:ffff

Action

Specify how the IP packets are processed.

Require Security

IPsec is applied, so all transmitted and received IP packets are protected by IPsec.

Allow

IPsec is not applied, so no transmitted or received IP packets are protected by IPsec.

Drop

All IP packets are discarded.

IPsec Settings

To Top

Encapsulation Type

Select one of the following encapsulation types:

Transport

This mode protects the payload of IP packets. Select this mode for communication between IPsec hosts.

Tunnel

This mode protects entire IP packets. Select this mode for communication between security gateways (VPN devices, for example).

Security Protocol

Select the security protocol used for IPsec communication.

AH

Provides secure transmission through authentication of packets only, including headers.

ESP

Provides secure transmission through both encryption and authentication. This protocol does not provide header authentication.

ESP&AH

Provides secure transmission through both encryption and authentication. These protocols provide header authentication.

Authentication Algorithm for AH

Select an authentication algorithm for AH.

Encryption Algorithm for ESP

Select an encryption algorithm for ESP.

Authentication Algorithm for ESP

Select an authentication algorithm for ESP.

Life Time

Specify the life time of IPsec SA (Security Association).
Specify it in time (seconds) or traffic volume (Kbytes) between peers. If you specify both a timed lifetime and a traffic-volume lifetime, SA will expire after the first of these lifetimes is reached, and the newly negotiated SA will replace it.

Key Perfect Forward Secrecy

Specify whether PFS (Perfect Forward Secrecy) is enabled or disabled.

IKE Settings

To Top

IKE Version

Displays the IKE version to be used.

Note

Encryption Algorithm

Select the encryption algorithm type for Phase 1.

Authentication Algorithm

Select the authentication algorithm type for Phase 1.

IKE Life Time

Specify the life time of ISAKMP SA.

IKE Diffie-Hellman Group

Select the Diffie-Hellman group number used for IKE encryption key generation.

Pre-Shared Key

Enter the PSK (Pre-Shared Key) text string used for authenticating the destination peer. You can use up to 32 alphanumeric characters, including spaces.

Key Perfect Forward Secrecy

Specify whether PFS (Perfect Forward Secrecy) is enabled or disabled.

Buttons

To Top

Refresh

Click to update the currently displayed information.

Note

Please enter Administrator Password.

Enter the administrator password.

Note

Apply

Click to apply the settings.

Cancel

Click to cancel the settings.

 

To Top