D-Link DSR-250v2 Product Manual - Page 88

IPsec Profiles

Page 88 highlights

IPsec Profiles The Ipsec profile is the central configuration in IPSec that defines most of the IPSec parameters such as the protocol, algorithms, SA lifetime, and key management protocol. In addition, it contains information related to algorithms such as encryption, authentication, and DH group for Phase I and II negotiations. This section lists all the configured ipsec profiles. The fields displayed on the Ipsec profile table are as follows: Field Name IKE version In use Description It displays the name of the configured ipsec profile. It displays the version of IKE that has been used. It indicates if the configured ipsec profile is being used or not. Click + to add a new entry to the list. This opens the Add Ipsec profiles page. To delete multiple entries, select the checkboxes of the Ipsec profiles you want to delete, and click Delete.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112

IPsec Profiles
The Ipsec profile is the central configuration in IPSec that defines most of the IPSec parameters such as the protocol, algorithms, SA lifetime, and
key management protocol. In addition, it contains information related to algorithms such as encryption, authentication, and DH group for Phase I
and II negotiations. This section lists all the configured ipsec profiles.
The fields displayed on the
table are as follows:
Ipsec profile
Field
Description
Name
It displays the name of the configured ipsec profile.
IKE version
It displays the version of IKE that has been used.
In use
It indicates if the configured ipsec profile is being used or not.
Click
to add a new entry to the list. This opens the
page. To delete multiple entries, select the checkboxes of the Ipsec
+
Add Ipsec profiles
profiles you want to delete, and click
.
Delete