Quick Reference Guide
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Virtual Private Networking Using IPsec 6-19
v1.0, January 2010
4. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table.
To edit an IKE policy:
1. Select VPN > IPsec VPN from the main/submenu. The IPsec VPN submenu tabs appear with
the IKE Policies screen in view (see Figure 6-13 on page 6-13).
2. In the List of IKE Policies table, click the edit button to the right of the IKE policy that you
want to edit. The Edit IKE Policy screen is displayed. This screen shows the same field as the
Add IKE Policy screen (see Figure 6-14 on page 6-15).
3. Modify the settings that you wish to change (see Table 6-2 on page 6-16).
Extended Authentication
XAUTH
Configuration
Note: For more
information about
XAUTH and its
authentication
modes, see
“Configuring
XAUTH for VPN
Clients” on
page 6-34.
Select one of the following radio buttons to specify whether or not Extended
Authentication (XAUTH) is enabled, and–if enabled–which device is used to verify
user account information:
• None. XAUTH is disabled. This the default setting.
• Edge Device. The VPN firewall functions as a VPN concentrator on which one
or more gateway tunnels terminate. The authentication mode that is available
for this configuration is User Database, RADIUS PAP, or RADIUS CHAP.
• IPSec Host. The VPN firewall functions as a VPN client of the remote gateway.
In this configuration the VPN firewall is authenticated by a remote gateway with
a user name and password combination.
Authentication
Type
For an Edge Device configuration: from the pull-down menu,
select one of the following authentication types:
• User Database. XAUTH occurs through the VPN firewall’s
user database. Users must be added through the Add User
screen (see “User Database Configuration” on page 6-35).
• Radius PAP. XAUTH occurs through RADIUS Password
Authentication Protocol (PAP). The local user database is
first checked. If the user account is not present in the local
user database, the VPN firewall connects to a RADIUS
server. For more information, see “RADIUS Client
Configuration” on page 6-35.
• Radius CHAP. XAUTH occurs through RADIUS Challenge
Handshake Authentication Protocol (CHAP). For more
information, see “RADIUS Client Configuration” on
page 6-35.
Username The user name for XAUTH.
Password The password for XAUTH.
Table 6-2. Add IKE Policy Settings (continued)
Item Description (or Subfield and Description)










