Virtual Private Networking Using IPSec, PPTP, or L2TP Connections
297
ProSecure Unified Threat Management (UTM) Appliance
Identifier Type From the drop-down list, select one of the following ISAKMP identifiers to be used
by the UTM, and then specify the identifier in the Identifier field:
• Local WAN IP. The WAN IP address of the UTM. When you select this option,
the Identifier field automatically shows the IP address of the selected WAN
interface.
• FQDN. The Internet address for the UTM.
• User FQDN. The email address for a local VPN client or the UTM.
• DER ASN1 DN. A distinguished name (DN) that identifies the UTM in the
DER encoding and ASN.1 format.
Identifier Depending on the selection of the Identifier Type drop-down
list, enter the IP address, email address, FQDN, or
distinguished name.
Remote
Identifier Type From the drop-down list, select one of the following ISAKMP identifiers to be used
by the remote endpoint, and then specify the identifier in the Identifier field:
• Remote WAN IP. The WAN IP address of the remote endpoint. When you
select this option, the Identifier field automatically shows the IP address of the
selected WAN interface.
• FQDN. The FQDN for a remote gateway.
• User FQDN. The email address for a remote VPN client or gateway.
• DER ASN1 DN. A distinguished name (DN) that identifies the remote endpoint
in the DER encoding and ASN.1 format.
Identifier Depending on the selection of the Identifier Type drop-down
list, enter the IP address, email address, FQDN, or
distinguished name.
IKE SA Parameters
Encryption Algorithm From the drop-down list, select one of the following five algorithms to negotiate the
security association (SA):
• DES. Data Encryption Standard (DES).
• 3DES. Triple DES. This is the default algorithm.
• AES-128. Advanced Encryption Standard (AES) with a 128-bit key size.
• AES-192. AES with a 192-bit key size.
• AES-256. AES with a 256-bit key size.
Authentication
Algorithm
From the drop-down list, select one of the following algorithms to use in the VPN
header for the authentication process:
• SHA-1. Hash algorithm that produces a 160-bit digest. This is the default
setting.
• MD5. Hash algorithm that produces a 128-bit digest.
• AES-256. AES with a 256-bit key size.
• AES-512. AES with a 512-bit key size.
Table 72. Add IKE Policy screen settings (continued)
Setting Description