| Add VPN Policy / Edit VPN Policy |
To Create/Edit VPN Policy. VPN Policy describes the security parameters that are used for negotiations to establish a secure tunnel between two devices.To edit VPN Policy. |
Sample Configuration | |
---|---|
Parameter | Mandatory | Default | Description |
---|---|---|---|
Name | Yes | Specify VPN Policy name. Name confines to:
| |
Description | No | Specify description for VPN Policy. Description confines to:
| |
KeyingMethod | Yes | Automatic | Select Keying method to manage Keys from the available options: Automatic or Manual. KeyingMethod confines to:
|
AllowReKeying | Yes | Disable | Enable to start the negotiation process automatically before Key expiry. AllowReKeying confines to:
|
KeyNegotiationTries | Yes | 3 | Specify maximum key negotiation trials allowed. KeyNegotiationTries confines to:
|
AuthenticationMode | Yes | Main Mode | Select authentication mode for exchanging authentication information from the available options: Main Mode or Aggressive Mode. AuthenticationMode confines to:
|
PassDataInCompressedFormat | Yes | Enable | Enable to pass data in compressed format. PassDataInCompressedFormat confines to:
|
PerfectForwardSecrecy | Yes | Enable | Enable to generate new Key for every negotiation on Key expiry. PerfectForwardSecrecy confines to:
|
EncryptionAlgorithm1 | Yes | Select Encryption algorithm for maintaining integrity of exchanged data during Phase 1. EncryptionAlgorithm1 confines to:
| |
AuthenticationAlgorithm1 | Yes | Select Authentication algorithm to be used for authenticating communicating parties during Phase 1. AuthenticationAlgorithm1 confines to:
| |
EncryptionAlgorithm2 | No | Select Encryption algorithm for maintaining integrity of exchanged data during Phase 1. EncryptionAlgorithm2 confines to:
| |
AuthenticationAlgorithm2 | No | Select Authentication algorithm to be used for authenticating communicating parties during Phase 1. AuthenticationAlgorithm2 confines to:
| |
EncryptionAlgorithm3 | No | Select Encryption algorithm for maintaining integrity of exchanged data during Phase 1. EncryptionAlgorithm3 confines to:
| |
AuthenticationAlgorithm3 | No | Select Authentication algorithm to be used for authenticating communicating parties during Phase 1. AuthenticationAlgorithm3 confines to:
| |
DHGroup | Yes | Select DH Group which specifies the Key length used for encryption. DHGroup confines to:
| |
KeyLife | Yes | 3600 | Specify Key life in seconds after which the key expires. KeyLife confines to:
|
ReKeyMargin | Yes | 120 | Specify the time before which the negotiation process will start automatically before Key expiry. ReKeyMargin confines to:
|
RandomizeRe-KeyingMarginBy | Yes | Specify Randomize Re-Keying time. RandomizeRe-KeyingMarginBy confines to:
| |
DeadPeerDetection | No | Enable | Enable to check whether peer is live or not. DeadPeerDetection confines to:
|
Check Peer After Every | No | 30 | Specify time after which peer will check the status of another peer. Check Peer After Every confines to:
|
Wait For Response Upto | No | 120 | Specify time in seconds for initiated peer to wait for status response. Wait For Response Upto confines to:
|
Action When Peer Unreachable | No | Specify action to be taken when peer is not reachable. Action When Peer Unreachable confines to:
| |
EncryptionAlgorithm1 | Yes | Select Encryption algorithm for maintaining integrity of exchanged data during Phase 2. EncryptionAlgorithm1 confines to:
| |
AuthenticationAlgorithm1 | Yes | Select Authentication algorithm to be used for authenticating communicating parties during Phase 2. AuthenticationAlgorithm1 confines to:
| |
EncryptionAlgorithm2 | No | Select Encryption algorithm for maintaining integrity of exchanged data during Phase 2. EncryptionAlgorithm2 confines to:
| |
AuthenticationAlgorithm2 | No | Select Authentication algorithm to be used for authenticating communicating parties during Phase 2. AuthenticationAlgorithm2 confines to:
| |
EncryptionAlgorithm3 | No | Select Encryption algorithm for maintaining integrity of exchanged data during Phase 2. EncryptionAlgorithm3 confines to:
| |
AuthenticationAlgorithm3 | No | Select Authentication algorithm to be used for authenticating communicating parties during Phase 2. AuthenticationAlgorithm3 confines to:
| |
PFSGroup | No | Select PFS Group which specifies the Key length used for encryption. PFSGroup confines to:
| |
KeyLife | Yes | 3600 | Specify Key life for Phase 2 in seconds after which the key expires. KeyLife confines to:
|
LocalSPI | Yes | Select local SPI LocalSPI confines to:
| |
RemoteSPI | Yes | Select remote SPI. RemoteSPI confines to:
| |
EncryptionAlgorithm | Yes | If Keying method is selected as Manual, select Encryption algorithm for maintaining integrity of exchanged data during Phase 1. EncryptionAlgorithm confines to:
| |
InboundEncryptionKey | Yes | Specify Inbound Encryption Key. InboundEncryptionKey confines to:
| |
OutboundEncryptionKey | Yes | Specify Outbound Encryption Key. OutboundEncryptionKey confines to:
| |
AuthenticationAlgorithm | Yes | If keying method is selected as Manual, select Authentication algorithm to be used for authenticating communicating parties during Phase 1. AuthenticationAlgorithm confines to:
| |
sha2_96_truncate | No | Truncate SHA2-256 to 96bit sha2_96_truncate confines to:
| |
keyexchange | No | method of key exchange, which protocol should be used to initialize the connection. keyexchange confines to:
|
Operation | Status | Message |
---|---|---|
Add VPN Policy | 200 | |
Add VPN Policy | 500 | |
Add VPN Policy | 502 | |
Edit VPN Policy | 200 | |
Edit VPN Policy | 500 | |
Edit VPN Policy | 502 | |
Edit VPN Policy | 511 |