Tunnel Name |
Provide a name for the tunnel. The
name should identify the tunnel uniquely. |
Tunnel Type |
Configure the tunnel type as one
of the following:
- Site-to-Site – The tunnel
provides a secured connection between two sites. This is the
default setting.
- Remote Access – The tunnel
provides access to a network to remote devices.
|
Select Interface |
Configure the interface to use for
creating the tunnel. The following options are available:
- VLAN – Configure the tunnel over
a Virtual LAN interface. Use the spinner to
configure the VLAN number.
- WWAN – Configure the tunnel over
the WAN interface.
- PPPoE – Configure the tunnel
over the PPPoE interface.
|
Traffic Selector (ACL) |
Configure ACLs that manage the
traffic passing through the VPN tunnel. The following
options are available:
- Source – Provide the source
network along with its mask.
- Destination – Provide the
destination network along with its mask.
|
Peer |
Configure the peer for this
tunnel. The peer device can be specified either by its
hostname or by its IP address. |
Authentication |
Set the authentication used to
identify the peers on opposite ends of the VPN tunnel
connection. The following can be configured:
- Certificate – Use a certificate
to authenticate. This is the default
setting.
- Pre-Shared Key – Use a
pre-shared key to authenticate. Enter the secret key in the
space provided.
|
Local Identity |
Configure the local identity used
with this peer configuration for an IKE exchange with the
target VPN IPSec peer. Options include IP
Address, Distinguished
Name, FQDN,
email, and string.
The default setting is string. |
Remote Identity |
Configure the access point remote
identifier used with this peer configuration for an IKE
exchange with the target VPN IPSec peer. Options include
IP
Address, Distinguished
Name, FQDN,
email, and string.
The default setting is string. |
IKE Policy |
Configure the Internet Key Exchange (IKE)
policy to use. IKE is used to exchange authentication keys.
Select from one of the following:
- All – Use any IKE policy. This is the
default setting.
- IKE1 – Use IKE 1 only.
- IKE2 – Use IKE 2 only.
|
Transform Set |
Configure the transform set used
to specify how traffic is protected within the crypto ACL
defining the traffic that needs to be protected. Select the
appropriate traffic set from the drop-down list. |