D-Link DWC-1000 DWC-1000 User's Guide - Page 100

Enable Dead Peer Detection, None = disable XAUTH.

Page 100 highlights

VPN Settings Field Description Authentication Method Pre-shared key Select an authentication method. Choices are: • Pre-Shared Key = simple password-based key. • RSA-Signature = disables the Pre-shared key field and uses the Active Self Certificate uploaded in the Certificates page. A certificate must be configured in order for RSA-Signature to work. If Authentication Mode = Pre-Shared Key, enter an alpha-numeric key to be shared with IKE peer. The key does not support double-quotation marks. Diffie-Hellman (DH) Group Determines whether the Diffie-Hellman algorithm is used when exchanging keys. The DH Group sets the strength of the algorithm in bits. Ensure that the DH Group is configured identically on both sides of the IKE policy. SA-Lifetime Enter the interval, in seconds, after which the Security Association becomes invalid. Enable Dead Peer Detection Detection Period Determines whether dead peer detection is used to detect whether the Peer is alive or not. Choices are: • Checked = enable dead peer detection. If a peer is detected as dead, it deletes the IPsec and IKE Security Association. • Unchecked = disable dead peer detection. Enter the interval between consecutive DPD R-U-THERE messages. DPD R-U-THERE messages are sent only when the IPsec traffic is idle. Reconnect after failure count Enter the maximum number of DPD failures allowed before tearing down the connection. Extended Authentication Authentication Type Username Enables or disables Extended Authentication (XAUTH). Instead of configuring a unique VPN policy for each user, you can enable the wireless controller to authenticate users from a stored list of user accounts or with an external authentication server such as a RADIUS server. When connecting many VPN clients to a VPN gateway router, XAUTH allows authentication of users with methods in addition to the authentication method mentioned in the IKE SA parameters. Choices are: • None = disable XAUTH. • IPsec Host = authentication performed by remote gateway. In the Username and Password fields, enter the user name and password associated with the IKE policy for authenticating this gateway by the remote gateway. • Edge Device = use this VPN firewall as a VPN concentrator, where one or more gateway tunnels terminate. Enter the Authentication Type to be used in verifying credentials of the remote VPN gateways. If Extended Authentication = Edge Device, select the type of authentication to be used. Choices are: • User Database = verify against the wireless controller's VPN user database. Users must be added to the database. • Radius - PAP = VPN firewall checks the user database for user credentials. If the user account is not present, the VPN firewall connects to the RADIUS server • Radius - CHAP = uses the challenge to hide the password. If Extended Authentication = IPsec Host, enter the user name associated with the IKE policy for authenticating this gateway by the remote gateway. Password If Extended Authentication = IPsec Host, enter an alphanumeric password associated with the IKE policy for authenticating this gateway by the remote gateway. Phase 2 (Manual Policy Parameters) This section is used when Policy Type = Manual under the General section of this page. The Manual Policy creates a Security Association (SA) based on the following static inputs. For an example, see "Example of a Manual Policy" on page 103. 100 DWC-1000 Wireless Controller User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

VPN Settings
100
DWC-1000 Wireless Controller User’s Guide
Field
Description
Authentication Method
Select an authentication method. Choices are:
Pre-Shared Key = simple password-based key.
RSA-Signature = disables the Pre-shared key field and uses the Active Self Certificate
uploaded in the Certificates page. A certificate must be configured in order for RSA-Signature
to work.
Pre-shared key
If Authentication Mode = Pre-Shared Key, enter an alpha-numeric key to be shared with IKE
peer. The key does not support double-quotation marks.
Diffie-Hellman (DH) Group
Determines whether the Diffie-Hellman algorithm is used when exchanging keys. The DH Group
sets the strength of the algorithm in bits. Ensure that the DH Group is configured identically on
both sides of the IKE policy.
SA-Lifetime
Enter the interval, in seconds, after which the Security Association becomes invalid.
Enable Dead Peer Detection
Determines whether dead peer detection is used to detect whether the Peer is alive or not.
Choices are:
Checked = enable dead peer detection. If a peer is detected as dead, it deletes the IPsec and
IKE Security Association.
Unchecked = disable dead peer detection.
Detection Period
Enter the interval between consecutive DPD R-U-THERE messages. DPD R-U-THERE
messages are sent only when the IPsec traffic is idle.
Reconnect after failure count
Enter the maximum number of DPD failures allowed before tearing down the connection.
Extended Authentication
Enables or disables Extended Authentication (XAUTH). Instead of configuring a unique VPN
policy for each user, you can enable the wireless controller to authenticate users from a stored
list of user accounts or with an external authentication server such as a RADIUS server. When
connecting many VPN clients to a VPN gateway router, XAUTH allows authentication of users
with methods in addition to the authentication method mentioned in the IKE SA parameters.
Choices are:
None = disable XAUTH.
IPsec Host = authentication performed by remote gateway. In the Username and Password
fields, enter the user name and password associated with the IKE policy for authenticating this
gateway by the remote gateway.
Edge Device = use this VPN firewall as a VPN concentrator, where one or more gateway
tunnels terminate. Enter the Authentication Type to be used in verifying credentials of the
remote VPN gateways.
Authentication Type
If Extended Authentication = Edge Device, select the type of authentication to be used. Choices
are:
User Database = verify against the wireless controller’s VPN user database. Users must be
added to the database.
Radius – PAP = VPN firewall checks the user database for user credentials. If the user
account is not present, the VPN firewall connects to the RADIUS server
Radius – CHAP = uses the challenge to hide the password.
Username
If Extended Authentication = IPsec Host, enter the user name associated with the IKE policy for
authenticating this gateway by the remote gateway.
Password
If Extended Authentication = IPsec Host, enter an alphanumeric password associated with the
IKE policy for authenticating this gateway by the remote gateway.
Phase 2 (Manual Policy Parameters)
This section is used when Policy Type = Manual under the General section of this page. The Manual Policy creates a Security
Association (SA) based on the following static inputs. For an example, see “Example of a Manual Policy” on page 103.