Use this page to configure the IPsec encryption key manually. Settings 1 to 4 are the IPsec settings for communicating with specified peers.
Select the address type for IPsec communications. Selecting Inactive disables all the other settings on this page.
Specify the address of the machine.
You can enter the address in the format of "base address/mask length", or select one from the drop-down list.
To specify a range, click the option button, enter the base address, and then enter the mask length.
The mask length must be in the range of 0 to 32 for IPv4, or 0 to 128 for IPv6, as shown in the following tables:
IP address | Mask | Address range |
---|---|---|
192.168.1.1 | 32 | 192.168.1.1 only |
192.168.5.0 | 24 | 192.168.5.0 to 192.168.5.255 |
0.0.0.0 | 0 | All IPv4 addresses |
IP address | Mask | Address range |
---|---|---|
2001:1000:0:1234::1 | 128 | 2001:1000:0:1234::1 only |
2001:1000:0:1234:: | 80 | 2001:1000:0:1234:: to 2001:1000:0:1234:ffff:ffff:ffff:ffff |
:: | 0 | All IPv6 addresses |
Specify the address of the destination peer. Enter the address in the format of "base address/mask length".
To specify a range, follow the instructions for Local Address.
Select one of the following encapsulation modes:
This mode protects the payload of IP packets. Select this mode for communication between IPsec hosts.
This mode protects entire IP packets. Select this mode for communication between security gateways (VPN devices, for example).
Note
If you select Tunnel for Encapsulation Mode, you must also specify the IPsec coverage (i.e. the start and end of the tunnel end point).
Note
Specify the output SPI (Security Parameter Index) value for the manual key. You can enter a value between 256 and 4095.
Specify the input SPI (Security Parameter Index) value for the manual key. You can enter a value between 256 and 4095.
Select the security protocol for IPsec communications.
Note
Select the authentication algorithm that you require.
This field indicates whether or not an authentication key is created for the selected authentication algorithm.
To create or edit an authentication key, click Change.
Select the encryption algorithm that you require.
This field indicates whether or not an encryption key is created for the selected encryption algorithm.
To create or edit an encryption key, click Change.
Click to send the settings to the machine. To apply the settings, click OK on the IPsec page.
Click to cancel the settings.