freeGuard 100 CLI User Manual
265
dstport <port_integer>
Enter the port number that the remote VPN peer uses to
transport traffic related to the specified service (see
protocol). The dstport range is 1 to 65535. To specify all
ports, type 0.
0
internetbrowsing
<interface-name_str>
Select the Interface through which remoteVPN users
using this VPN tunnel canconnect to the Internet.
Configure Internet browsing to allow dialup VPN clients to
browse the internet over the IPSec VPN tunnel.
Null
keepalive {disable |
enable}
Enable keep alive to keep the VPN tunnel running even if
no data is being processed.
Disable
keylife_type {both | kbs
| seconds}
Set when the phase 2 key expires. When the key expires,
a new key is generated without interrupting service.
• To make the key expire after a period of time has
expired and after an amount of data is transmitted, select
both.
• To make the key expire after an amount of data is
transmitted, select kbs. Use the keylifekbs keyword to set
the amount of data that is transmitted.
• To make the key expire after a number of seconds
elapses, select seconds. Use the keylifeseconds keyword
to set the amount of time that elapses.
Seconds
keylifekbs <kb_integer> Set the number of KBytes of data to transmit before the
phase 2 key expires. kbyte_integer can be 5120 to 99999
KBytes.
5120
keylifeseconds
<seconds_integer>
Set the number of seconds to elapse before the phase 2
key expires. seconds_integer can be 120 to 172800
seconds.
1800
pfs {disable | enable}
Optionally, enable or disable perfect forwardsecrecy
(PFS). PFS ensures that each key created during Phase
2 is unrelated to keys created during Phase 1 or to other
keys created during Phase 2. PFS may cause minor
delays during key generation.
Disable
phase1name
<name_str>
Select a phase 1 gateway configurationname. Enter set
phase1name followed by a space and a ? to view a list of
available configurations.
No default.
proposal {3des-md5
3des-null 3des-sha1
aes128-md5 aes128-
null aes128-sha1
aes192-md5 aes192-
null aes192-sha1
aes256-md5 aes256-
null aes256-sha1 des-
md5 des-null des-sha1
null-md5 null-null null-
Select a minimum of one and a maximum of three
encryption-message digest combinations (for example,
3des-md5). The remote peer must be configured to use at
least one of the proposals that you define.Use a space to
separate the combinations. You can select any of the
following symmetric-key encryption algorithms:
• null-Do not use an encryption algorithm.
• des-Digital Encryption Standard, a 64-bit block algorithm
that uses a 56-bit key.
No default.
Summary of Contents for freeGuard 100
Page 1: ...freeGuard 100 UTM Firewall CLI USER S MANUAL P N F0025000 Rev 1 1...
Page 3: ......
Page 7: ......
Page 87: ...80 The config ips anomaly command has 1 subcommand config limit...
Page 183: ...176...