38
Chapter 6 - Basic Configuration Guide
C. If you are using both Ethernet ports, then the Bind To interface
should be set to Ethernet 1. For single Ethernet setups, it
should be Ethernet 0. This specifies which interface on this
device will act as the end point for the tunnels defined by this
configuration. Packets sent from this device to the remote Tun-
nel Partner will use this interface’s IP address as a source
address.
D. Click OK.
3. Set up Key Management
These settings control how the local Tunnel Partner will identify and
authenticate the remote Tunnel Partner. IKE Key Management is
recommended.
IKE Key Management
Once a VPN port has been created, you may access the IKE Key
Management dialog box by clicking on the port’s icon in the Device
View and selecting IKE Key Management.
A. From the pull-down menu, select the Key Manage method to
use for this tunnel.
If Auto key management is selected, IKE will be used to allow
two devices to negotiate between themselves which encryption
and authentication methods will be used for the tunnel.
If Manual is selected, this Tunnel Partner will not use IKE,
and the tunnel’s encryption and authentication parameters
must be manually set in the Manual Key Management dialog
box, which is not described in this guide.
If Initiate is selected, this Tunnel Partner will use IKE, but