System > Network > VPN > IPSec VPN
IKE VPN is one of the ways of configure the IPSec VPN.
In the IKE VPN page, click the IKE VPN List tab. In this tab, you can configure the following actions:
Options in the IKE VPN Configuration dialog:
Option | Description |
Basic | |
Peer Name |
Select a peer. After selecting a peer, click Edit to edit the configurations of this peer. You can click New from the drop-down menu to create a new peer. For details on creating a new peer, see Configuring a VPN Peer. |
Peer Information |
Displays the peer information, including the peer name, mode, type, local ID, and peer ID. |
Name |
Specifies the tunnel name. |
Mode |
Specifies the mode. The system supports the tunnel mode and the transport mode. |
P2 Proposal |
Specifies the P2 proposal for the tunnel. |
Proxy ID |
Specifies ID of Phase 2 for the tunnel which can be Auto or Manual.
|
Advanced | |
DNS1 |
Specifies the IP address of the DNS server that will be allocated to the client by the PnPVPN server. The specified DNS server is the primary one. |
DNS2/DNS3/DNS4 |
Specifies the auxiliary DNS servers. You can specify at most three auxiliary DNS servers. |
WINS1 |
Specifies the IP address of the WINS server that will be allocated to the client by the PnPVPN server. The specified WINS1 server is the primary one. |
WINS2 |
Specifies the auxiliary DNS servers. You can specify one auxiliary DNS servers. |
Enable Idle Time |
Select Enable to enable the idle time function. By default, this function is disabled. This time length you specified in the Idle Time textbox is the longest time the tunnel can exist without traffic passing through. When the time is over, SA will be cleared. |
DF-Bit |
Select whether to allow the forwarding device to execute IP packet fragmentation. The options are:
|
Anti-Replay |
Anti-replay is used to prevent hackers from attacking the device by resending the sniffed packets, i.e., the receiver rejects the obsolete or repeated packets. By default, this function is disabled.
|
Commit Bit |
Select the Enable checkbox to make the corresponding party configure the commit bit function, which can avoid packet loss and time difference. However, commit bit may slow the responding speed. |
Auto Connect |
Select the Enable checkbox to enable the auto connection function. By default, this function is disabled. The device has two methods of establishing SA: auto and traffic intrigued. When it is auto, the device checks SA status every 60 seconds and initiates negotiation request when SA is not established; when it is traffic intrigued, the tunnel sends negotiation request only when there is traffic passing through the tunnel. By default, traffic intrigued mode is used. Note: Auto connection works only when the peer IP is static and the local device is initiator. |
Tunnel Route |
Configure the tunnel route when editing the IKE VPN configurations. When editing the IKE VPN configurations, click Select and the Route Configuration dialog appears. In the Tunnel Route Configuration dialog, add one or more tunnel routes. You can add at most 128 tunnel routes. |
Description |
Type the description for the tunnel. |
VPN Track |
Select the Enable checkbox to enable the VPN track function. The device can monitor the connectivity status of the specified VPN tunnel, and also allows backup or load sharing between two or more VPN tunnels. This function is applicable to both route-based and policy-based VPNs. The options are:
|