To add security association
Click the Add icon.
Add the Basic information.
Enter the Security Association Name to identify.
Select the Authentication Method to be used for the Security Association.
Tabs will be changed based on the Authentication Method selection.
| IKE using shared secret key | Selecting this option requires you to use IKE Phase 1 and IPSec Phase 2. |
| Manual key | Selecting this option opens IPSec SA options. |
| Certificates |
Selecting this option requires you to use IKE Phase 1 and IPSec Phase 2. Local certificates can be selected for individual devices when creating a VPN Topology |
Enter a password for the VPN gateway in the Shared Secret Key field.
This field is available only if IKE using shared secret key is selected as an authentication method.
Set the IKE Phase 1 details for authentication method, IKE using shared secret key and Certificates.
Select the Exchange Mode between IKEv2 and Aggressive mode(IKEv1).
| IKEv2 | Phase 1 proposal will be auto selected based on Hub firewall's IKEv2 Dynamic Client Proposal settings. |
| Aggressive mode(IKEv1) |
Set the options for:
|
Set LifeTime of IKE.
The default value is 28800 seconds. You can set this value between 120 to 9999999.
Set the IPSec Phase 2 details for authentication method, IKE using shared secret key and Certificates.
Select the Protocol between ESP and AH.
| ESP |
Set the options for:
|
| AH |
AH protocol does not require Encryption. Encryption options are not available when AH protocol is selected. Set the options for:
|
Set LifeTime of IKE.
The default value is 28800 seconds. You can set this value between 120 to 9999999.
Set the IPSec SA details for Manual key authentication method.
Set the Protocol, Encryption, and Authentication details. AH protocol does not require Encryption.
Unique Keys are generated for each firewall device when creating a VPN Topology for Incoming SPI, Outgoing SPI, Encryption Key, and Authentication Key.