Use this tab to edit the IPsec policy.
Specify the order of the IPsec policy by selecting number (1-10) in IPsec Policy List.
Specify whether this IPsec policy is active or inactive.
Enter the name of the IPsec policy, using up to 16 alphanumeric characters.
Select an address type to be used for IPsec communication.
Specify the address of the machine.
Enter the address of the destination.
Enter the prefix length of the address specified for Remote Address. The prefix length must be in the range of 1 to 32 for IPv4, or 1 to 128 for IPv6, as shown in the following tables:
| IP address | Prefix Length | Address range |
|---|---|---|
| 192.168.1.1 | 32 | 192.168.1.1 only |
| 192.168.5.0 | 24 | 192.168.5.0 to 192.168.5.255 |
| IP address | Prefix Length | Address range |
|---|---|---|
| 2001:1000:0:1234::1 | 128 | 2001:1000:0:1234::1 only |
| 2001:1000:0:1234:: | 80 | 2001:1000:0:1234:: to 2001:1000:0:1234:ffff:ffff:ffff:ffff |
Specify how the IP packets are processed.
IPsec is applied, so all transmitted and received IP packets are protected by IPsec.
IPsec is not applied, so no transmitted or received IP packets are protected by IPsec.
All IP packets are discarded.
Select one of the following encapsulation types:
This mode protects the payload of IP packets. Select this mode for communication between IPsec hosts.
This mode protects entire IP packets. Select this mode for communication between security gateways (VPN devices, for example).
Select the security protocol used for IPsec communication.
Provides secure transmission through authentication of packets only, including headers.
Provides secure transmission through both encryption and authentication. This protocol does not provide header authentication.
Provides secure transmission through both encryption and authentication. These protocols provide header authentication.
Select an authentication algorithm for AH.
Select an encryption algorithm for ESP.
Select an authentication algorithm for ESP.
Specify the life time of IPsec SA (Security Association).
Specify it in time (seconds) or traffic volume (Kbytes) between peers.
If you specify both a timed lifetime and a traffic-volume lifetime,
SA will expire after the first of these lifetimes is reached, and the newly negotiated SA will replace it.
Specify whether PFS (Perfect Forward Secrecy) is enabled or disabled.
Displays the IKE version to be used.
Note
Select the encryption algorithm type for Phase 1.
Select the authentication algorithm type for Phase 1.
Specify the life time of ISAKMP SA.
Select the Diffie-Hellman group number used for IKE encryption key generation.
Enter the PSK (Pre-Shared Key) text string used for authenticating the destination peer. You can use up to 32 alphanumeric characters, including spaces.
Specify whether PFS (Perfect Forward Secrecy) is enabled or disabled.
Click to update the currently displayed information.
Note
Enter the administrator password.
Note
Click to apply the settings.
Click to cancel the settings.