TP-Link OC200 Omada Controller Software 4.1.5Windows/Linux User Guide - Page 124

then establish the IPsec Security Associations IPsec SA., For Phase-1 Settings

Page 124 highlights

Chapter 4 Configure the Network with Omada SDN Controller define what traffic can go through the VPN, and how to encrypt and authenticate the traffic, then establish the IPsec Security Associations (IPsec SA). Refer to the following table to complete the configurations according to your actual needs and click Create. For Phase-1 Settings: Phase-1 Settings The IKE version you select determines the available Phase-1 settings and defines the negotiation process . Both VPN gateways must be configured to use the same IKE version and Phase-1 settings. Internet Key Exchange Version Select the version of Internet Key Exchange (IKE) protocol which is used to set up security associations for IPsec. Both IKEv1 and IKEv2 are supported with Omada managed gateways, but IKEv1 is available only when the VPN policy is applied to a single Remote Subnet and a single Local Network. Note that both peer gateways must be configured to use the same IKE version. Proposal Specify the proposal for IKE negotiation phase-1. An IKE proposal lists the encryption algorithm, authentication algorithm and Diffie-Hellman (DH) groups to be negotiated with the remote IPsec peer- Authentication algorithms verify the data integrity and authenticity of a message. The types of authentication includes MD5 and SHA1. Encryption algorithms protect the data from being read by a third-party. The types of encryption algorithm includes DES, 3DES, AES128, AES192, and AES256. Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. The DH group includes DH1, DH2, DH5, DH14, DH15, DH16, DH19, DH20, DH21, DH25, and DH26. Note that both peer gateways must be configured to use the same Proposal. Exchange Mode Specify the IKE Exchange Mode when IKEv1 is selected. Main Mode: This mode provides identity protection and exchanges more information, which applies to scenarios with higher requirements for identity protection. Aggressive Mode: This mode establishes a faster connection but with lower security, which applies to scenarios with lower requirements for identity protection. Negotiation Mode Specify the IKE Negotiation Mode as Initiator Mode or Responder Mode. Initiator Mode: This mode means that the local device initiates a connection to the peer. Responder Mode: This mode means that the local device waits for the connection request initiated by the peer. 122

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333

122
Chapter 4
Configure the Network with Omada SDN Controller
define what traffic can go through the VPN, and how to encrypt and authenticate the traffic,
then establish the IPsec Security Associations (IPsec SA).
Refer to the following table to complete the configurations according to your actual needs and
click
Create
.
For Phase-1 Settings:
Phase-1 Settings
The IKE version you select determines the available Phase-1 settings and defines
the negotiation process . Both VPN gateways must be configured to use the same
IKE version and Phase-1 settings.
Internet Key Exchange
Version
Select the version of Internet Key Exchange (IKE) protocol which is used to set up
security associations for IPsec. Both IKEv1 and IKEv2 are supported with Omada
managed gateways, but IKEv1 is available only when the VPN policy is applied to a
single Remote Subnet and a single Local Network.
Note that both peer gateways must be configured to use the same IKE version.
Proposal
Specify the proposal for IKE negotiation phase-1. An IKE proposal lists the
encryption algorithm, authentication algorithm and Diffie-Hellman (DH) groups to
be negotiated with the remote IPsec peer—
Authentication algorithms verify the data integrity and authenticity of a message.
The types of authentication includes MD5 and SHA1.
Encryption algorithms protect the data from being read by a third-party. The types
of encryption algorithm includes DES, 3DES, AES128, AES192, and AES256.
Diffie-Hellman (DH) groups determine the strength of the key used in the key
exchange process. The DH group includes DH1, DH2, DH5, DH14, DH15, DH16,
DH19, DH20, DH21, DH25, and DH26.
Note that both peer gateways must be configured to use the same Proposal.
Exchange Mode
Specify the IKE Exchange Mode when IKEv1 is selected.
Main Mode:
This mode provides identity protection and exchanges more
information, which applies to scenarios with higher requirements for identity
protection.
Aggressive Mode:
This mode establishes a faster connection but with lower
security, which applies to scenarios with lower requirements for identity
protection.
Negotiation Mode
Specify the IKE Negotiation Mode as Initiator Mode or Responder Mode.
Initiator Mode:
This mode means that the local device initiates a connection to the
peer.
Responder Mode:
This mode means that the local device waits for the connection
request initiated by the peer.