Use this page to configure the IPsec communication settings.
Select whether to enable or disable IPsec communications.
If you select "Active", the machine will search from Parameter 1 to Parameter 10 for the IPsec policy that matches the IPsec settings of the destination, and will then begin processing IP packets according to that policy.
Displays the parameters of IPsec policies registered in the machine. You can register up to 10 policies. The machine begins searching for the policy from the top of the list, and selects the first match.
An "IPsec Policy" determines whether or not IP packets are secured by IPsec and which functions are used if they are.
Select the address type used for IPsec communications. Selecting Inactive disables all the other settings on this page.
Specify the address of the machine. You can enter the address in the format of "base address/mask length", or select one from the drop-down list.
To specify a range, enter the base address, and then enter the mask length.
The mask length must be in the range of 0 to 32 for IPv4, or 0 to 128 for IPv6, as shown in the following tables:
| IP address | Mask | Address range |
|---|---|---|
| 192.168.1.1 | 32 | 192.168.1.1 only |
| 192.168.5.0 | 24 | 192.168.5.0 to 192.168.5.255 |
| 0.0.0.0 | 0 | All IPv4 addresses |
| IP address | Mask | Address range |
|---|---|---|
| 2001:1000:0:1234::1 | 128 | 2001:1000:0:1234::1 only |
| 2001:1000:0:1234:: | 80 | 2001:1000:0:1234:: to 2001:1000:0:1234:ffff:ffff:ffff:ffff |
| :: | 0 | All IPv6 addresses |
Specify the address of the destination peer. Enter the address in the format of "base address/mask length".
To specify a range of addresses, follow the instructions for Local Address.
Enter the protocol number to specify the transport protocol. You can enter up to 3 numeric characters. Enter "0" for any arbitrary protocol.
If the protocol number is "6" (TCP) or "17" (UDP), you can specify a port number for Local and Remote Addresses respectively. Enter "0" for any arbitrary port.
Select the security protocol used for IPsec communication.
Provides secure transmission through authentication of packets only, including headers.
Provides secure transmission through both encryption and authentication. This protocol does not provide header authentication.
Provides secure transmission through both encryption and authentication. These protocols provide header authentication.
Select an authentication algorithm for AH.
Select an authentication algorithm for ESP.
Select an encryption algorithm for ESP.
Specify how the IP packets are processed.
IPsec is applied, so all transmitted and received IP packets are protected by IPsec.
IPsec is not applied, so no transmitted or received IP packets are protected by IPsec.
All IP packets are discarded.
Specify the life time of IPsec SA (Security Association).
Specify it in time (seconds) or traffic volume (KB) between peers.
If you specify both a timed lifetime and a traffic-volume lifetime, SA will expire after the first of these lifetimes is reached, and the newly negotiated SA will replace it.
Select the encryption algorithm type for ISAKMP-SA.
Select the hash algorithm type for ISAKMP-SA.
Select the method of authenticating the destination peer. If you select PSK, enter the text for PSK Text.
Enter the PSK (Pre-Shared Key) text string used for authenticating the destination peer. You can use up to 32 alphanumeric characters, including spaces.
You can set or change the PSK text only when this check box is selected.
Confirm the PSK text string by entering it again in this box.
To create the PSK text string, the text entered here must match that in the PSK Text box.
Select the Diffie-Hellman group number used for IKE encryption key generation.
Specify whether PFS (Perfect Forward Secrecy) is active or inactive. If you want PFS to be active, select a group number.
Specify how the machine responds when its IPsec settings do not match those of the destination peer. Select one of the following options:
If the IPsec settings of this machine and the peer do not match, communications are disabled.
If the IPsec settings of this machine and the peer do not match, communications are exchanged in clear text.
Only the communications using the transport layer protocol specified in Protocol Number are protected by IPsec. If the IPsec settings of this machine and the peer do not match, the communications are disabled. The communications using other transport layer protocols are exchanged in clear text.
Specify the life time of ISAKMP-SA.
Click to update the currently displayed information.
Note
Click to apply the settings.
Click to cancel the settings.