Quick Reference Guide

ProSafe VPN Firewall 50 FVS338 Reference Manual
Virtual Private Networking 5-17
v1.0, January 2010
Each policy that is listed in the List of IKE Policies table contains the following data:
Name. Uniquely identifies each IKE policy. The name is chosen by you and used for the
purpose of managing your policies; it is not supplied to the remote VPN Server. If the policy is
a client policy, it will be prepended by an “*”.
Mode. Two modes are available: either “Main” or “Aggressive”.
Main Mode is slower but more secure.
Aggressive mode is faster but less secure. (If specifying either a FQDN or a User FQDN
name as the Local ID/Remote ID, aggressive mode is automatically selected.)
Local ID. The IKE/ISAKMP identifier of this device. (The remote VPN must have this value
as their “Remote ID”.)
Remote ID. The IKE/ISAKMP identifier of the remote VPN gateway. (The remote VPN must
have this value as their “Local ID”.)
Encr. Encryption Algorithm used for the IKE SA. The default setting using the VPN Wizard is
3DES. (This setting must match the Remote VPN.)
Auth. Authentication algorithm used for the IKE SA. The default setting using the VPN
Wizard is SHA1. (This setting must match the remote VPN.)
DH. Diffie-Hellman Group. The Diffie-Hellman algorithm is used when exchanging keys. The
DH Group sets the number of bits. The VPN Wizard default setting is Group 2. (This setting
must match the remote VPN.)
Enable Dead Peer Detection: Dead Peer Detection is used to detect whether the peer is alive
or not. If the peer is detected as dead, the IPSec and IKE Security Association are deleted.
Figure 5-19