User`s guide
Chapter 10 IPSec VPN Config Screens
LAN-Cell 2 User’s Guide
217
Content The configuration of the peer content depends on the peer ID type.
Do the following when you set Authentication Key to Pre-shared Key.
For IP, type the IP address of the computer with which you will make the VPN
connection. If you configure this field to 0.0.0.0 or leave it blank, the LAN-Cell will
use the address in the Remote Gateway Address field (refer to the Remote
Gateway Address field description).
For DNS or E-mail, type a domain name or e-mail address by which to identify the
remote IPSec router. Use up to 31 ASCII characters including spaces, although
trailing spaces are truncated. The domain name or e-mail address is for
identification purposes only and can be any string.
It is recommended that you type an IP address other than 0.0.0.0 or use the DNS
or E-mail ID type in the following situations:
1. When there is a NAT router between the two IPSec routers.
2. When you want the LAN-Cell to distinguish between VPN connection requests
that come in from remote IPSec routers with dynamic WAN IP addresses.
Do the following when you set Authentication Key to Certificate.
1. For IP, type the IP address from the subject alternative name field of the
certificate the remote IPSec router will use for this VPN connection. If you
configure this field to 0.0.0.0 or leave it blank, the LAN-Cell will use the address in
the Remote Gateway Address field (refer to the Remote Gateway Address
field description).
2. For DNS or E-mail, type the domain name or e-mail address from the subject
alternative name field of the certificate the remote IPSec router will use for this
VPN connection.
3. For Subject Name, type the subject name of the certificate the remote IPSec
router will use for this VPN connection. Use up to255 ASCII characters including
spaces.
4. For Any, the peer Content field is not available.
5. Regardless of how you configure the ID Type and Content fields, two active
IPSec SAs cannot have both the local and remote IP address ranges overlap
between rules.
Extended Authentication
Enable Extended
Authentication
Select this check box to activate extended authentication.
Server Mode Select Server Mode to have this LAN-Cell authenticate extended authentication
clients that request this VPN connection.
You must also configure the extended authentication clients’ usernames and
passwords in the authentication server’s local user database or a RADIUS server
(see Chapter 12 on page 283).
Click Local User to go to the Local User Database screen where you can view
and/or edit the list of user names and passwords. Click RADIUS to go to the
RADIUS screen where you can configure the LAN-Cell to check an external
RADIUS server.
During authentication, if the LAN-Cell (in server mode) does not find the extended
authentication clients’ user name in its internal user database and an external
RADIUS server has been enabled, it attempts to authenticate the client through
the RADIUS server.
Client Mode Select Client Mode to have your LAN-Cell use a username and password when
initiating this VPN connection to the extended authentication server LAN-Cell.
Only a VPN extended authentication client can initiate this VPN connection.
User Name Enter a user name for your LAN-Cell to be authenticated by the VPN peer (in
server mode). The user name can be up to 31 case-sensitive ASCII characters,
but spaces are not allowed. You must enter a user name and password when you
select client mode.
Table 77 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy (continued)
LABEL DESCRIPTION