Netgear UTM25-100NAS Reference Manual - Page 258

Table 7-16. Add IKE Policy Settings for a Mode Config Configuration continued, Remote

Page 258 highlights

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Table 7-16. Add IKE Policy Settings for a Mode Config Configuration (continued) Item Description (or Subfield and Description) Remote Identifier Type From the pull-down menu, select FQDN. Note: Mode Config requires that the remote end is defined by a FQDN. Identifier Enter the FQDN for the remote end. This must be a FQDN that is not used in any other IKE policy. In this example, we are using utm25_remote.com. IKE SA Parameters Note: Generally, the default settings work well for a Mode Config configuration. Encryption Algorithm From the pull-down menu, select the 3DES algorithm to negotiate the security association (SA). Authentication Algorithm From the pull-down menu, select the SHA-1 algorithm to be used in the VPN header for the authentication process. Authentication Method Select Pre-shared key as the authentication method, and enter a key in the field below. Pre-shared key A key with a minimum length of 8 characters no more than 49 characters. Do not use a double quote (") in the key. In this example, we are using 12345678910. Diffie-Hellman (DH) Group The DH Group sets the strength of the algorithm in bits. From the pull-down menu, select Group 2 (1024 bit). SA-Lifetime (sec) The period in seconds for which the IKE SA is valid. When the period times out, the next rekeying must occur. The default is 28800 seconds (8 hours). However, for a Mode Config configuration, NETGEAR recommends 3600 seconds (1 hour). Enable Dead Peer Detection Note: See also "Configuring Keepalives and Dead Peer Detection" on page 7-54. Select a radio button to specify whether or not Dead Peer Detection (DPD) is enabled: • Yes. This feature is enabled: when the UTM25 detects an IKE connection failure, it deletes the IPsec and IKE SA and forces a reestablishment of the connection. You must enter the detection period and the maximum number of times that the UTM attempts to reconnect (see below). • No. This feature is disabled. This is the default setting. Detection Period The period in seconds between consecutive "DPD R-U-THERE" messages, which are sent only when the IPsec traffic is idle. The default setting is 10 seconds. Reconnect after failure count The maximum number of times that the UTM attempts to reconnect after a DPD situation. When the maximum number of times is exceeded, the IPsec connection is terminated. The default setting is 3 IKE connection failures. 7-48 Virtual Private Networking Using IPsec Connections v1.0, September 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
7-48
Virtual Private Networking Using IPsec Connections
v1.0, September 2009
Remote
Identifier Type
From the pull-down menu, select
FQDN
.
Note
: Mode Config requires that the remote end is defined by a FQDN.
Identifier
Enter the FQDN for the remote end. This must be a FQDN
that is not used in any other IKE policy. In this example, we
are using utm25_remote.com.
IKE SA Parameters
Note
: Generally, the default settings work well for a Mode Config configuration.
Encryption Algorithm
From the pull-down menu, select the
3DES
algorithm to negotiate the security
association (SA).
Authentication
Algorithm
From the pull-down menu, select the
SHA-1
algorithm to be used in the VPN
header for the authentication process.
Authentication Method
Select
Pre-shared key
as the authentication method, and enter a key in the
field below.
Pre-shared key
A key with a minimum length of 8 characters no more than
49 characters. Do not use a double quote (“) in the key. In
this example, we are using 12345678910.
Diffie-Hellman (DH)
Group
The DH Group sets the strength of the algorithm in bits. From the pull-down
menu, select
Group 2 (1024 bit)
.
SA-Lifetime (sec)
The period in seconds for which the IKE SA is valid. When the period times
out, the next rekeying must occur. The default is 28800 seconds (8 hours).
However, for a Mode Config configuration, NETGEAR recommends
3600 seconds (1 hour).
Enable Dead Peer
Detection
Note
: See also
“Configuring
Keepalives and Dead
Peer Detection” on
page 7-54
.
Select a radio button to specify whether or not Dead Peer Detection (DPD) is
enabled:
Yes
. This feature is enabled: when the UTM25 detects an IKE connection
failure, it deletes the IPsec and IKE SA and forces a reestablishment of the
connection. You must enter the detection period and the maximum number
of times that the UTM attempts to reconnect (see below).
No
. This feature is disabled. This is the default setting.
Detection Period
The period in seconds between consecutive
“DPD R-U-THERE” messages, which are sent only when
the IPsec traffic is idle. The default setting is 10 seconds.
Reconnect after
failure count
The maximum number of times that the UTM attempts to
reconnect after a DPD situation. When the maximum
number of times is exceeded, the IPsec connection is
terminated. The default setting is 3 IKE connection failures.
Table 7-16. Add IKE Policy Settings for a Mode Config Configuration (continued)
Item
Description (or Subfield and Description)