Quick Reference Guide

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
6-14 Virtual Private Networking Using IPsec
v1.0, January 2010
Each policy contains the data that are explained in Table 6-1 These fields are explained in more
detail in Table 6-2 on page 6-16.
To delete one or more IKE polices:
1. Select the checkbox to the left of the policy that you want to delete or click the select all
button to select all IKE policies.
2. Click the delete button.
To add or edit an IKE policy, see “Manually Adding or Editing an IKE Policy” on page 6-15.
Table 6-1. List of IKE Policies Information
Item Description (or Subfield and Description)
Name The name that identifies the IKE policy. When you use the VPN Wizard to set up
a VPN policy, an accompanying IKE policy is automatically created with the
same name that you select for the VPN policy.
Note: The name is not supplied to the remote VPN endpoint.
Mode The exchange mode: Main or Aggressive.
Local ID The IKE/ISAKMP identifier of the VPN firewall. The remote endpoint must have
this value as its remote ID.
Remote ID The IKE/ISAKMP identifier of the remote endpoint, which must have this value
as its Local ID.
Encr The encryption algorithm that is used for the IKE security association (SA). This
setting must match the setting on the remote endpoint.
Auth The authentication algorithm that is used for the IKE SA. This setting must match
the setting on the remote endpoint.
DH The Diffie-Hellman (DH) group that is used when exchanging keys. This setting
must match the setting on the remote endpoint.
Note: You cannot delete or edit an IKE policy for which the VPN policy is active. You
first must disable or delete the VPN policy before you can delete or edit the IKE
policy.
Note: To gain a more complete understanding of the encryption, authentication and
DH algorithm technologies, see the link to “Virtual Private Networking Basics” in
Appendix C.