4.
Web Management
AirLive AirMax4GW User’s Manual
101
clients. You can not only configure a VPN rule with a pre-shared key for all
remote users, but you can also designate account / password for specific
users that are permitted to establish VPN connection with VPN server.
There are 3 roles to let Business Security Gateway behave as for X-Auth
authentication, including None, Server and Client. For None role, there is no
X-Auth authentication happens during VPN tunnel establishing. For Server
role, click “X-Auth Account” button to modify 10 user accounts for user
validation during tunnel establishing to VPN server. Finally, for Client role,
there are two additional parameters to fill: “User Name” and “Password” for
valid user to initiate that tunnel.
3.
Dead Peer Detection:
This feature will detect if remote VPN peer still
exists. Delay indicates the interval between detections, and Timeout
indicates the timeout of detected to be dead.
4.
Phase 1 Key Life Time
: The value of life time represents the life time of the
key which is dedicated at Phase 1 between both end gateways.
4.2.3.2.8 IKE Proposal Definition
There are 4 IKE proposals can be defined by you and used in IKE phase of
negotiation between two VPN peers.
1.
Encryption:
There are six algorithms can be selected: DES, 3DES,
AES-auto, AES-128, AES-192, and AES-256.
2.
Authentication:
There are
five
algorithms can be selected: None, MD5,
SHA1, SHA2-256 and SHA2-512.
3.
DH Group:
There are
nine
groups can be selected: None, Group 1
(MODP768), Group 2 (MODP1024), Group 5 (MODP1536) and Group14 ~
18.
4.
Enable:
Check this box to enable the IKE Proposal during tunnel establishing.