18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Entering information<br />

on the Advanced tab<br />

Chapter 14: Configuring Virtual Private Networks<br />

Configuring VPN Security Associations<br />

The Advanced tab defines some <strong>of</strong> the more arcane points <strong>of</strong> a VPN<br />

association. As a general rule only administrators that are highly-schooled in<br />

the nuts and bolts <strong>of</strong> VPN should modify the information on this tab. The<br />

information on this tab is only used with automatic key exchange (that is<br />

Authentication Method = Password, Certificate + Certificate Authority, or Single<br />

Certificate on the Authentication tab). The Advanced tab contains the following<br />

fields and buttons.<br />

Phase 1 (ISAKMP) Rekey data fields<br />

• Hard Limits—Indicates how <strong>of</strong>ten the system must negotiate for new<br />

ISAKMP keys and how much ISAKMP traffic this phase can protect. The<br />

defaults are 3600 seconds (1 hour) and 0 (meaning no limit to the amount<br />

<strong>of</strong> traffic).<br />

• S<strong>of</strong>t Percentage—Indicates how far in advance <strong>of</strong> the hard limit to begin<br />

negotiating for new keys. This makes sure you have some new keys on<br />

hand by the time the hard limit expires.<br />

• P1 Crypto—Specifies the crypto algorithm to use during Phase 1.<br />

• P1 Hash: Specifies the hash algorithm to use during Phase 1.<br />

• P1 Oakley—Indicates the Diffie-Hellman group to use for the PFS<br />

derivation <strong>of</strong> ISAKMP keys.<br />

• Force XAuth on Rekey—Select this option to force XAuth to be performed<br />

each time the phase 1 session is started or renegotiated.<br />

• Relax Strict Identity Matching—Select this option to relax the identity<br />

matching restrictions. If you are experiencing issues associated with<br />

identity processing with the remote VPN peer, selecting this option can<br />

improve interoperability.<br />

Phase 2 (IPSEC) Rekey data fields<br />

• Hard Lifetimes—Indicates how <strong>of</strong>ten the system must negotiate for new<br />

IPsec keys and how much traffic it can encrypt. The defaults are 700<br />

seconds and 0 (meaning no traffic limit).<br />

• S<strong>of</strong>t Percentage—Indicates how far in advance <strong>of</strong> the hard limit to begin<br />

negotiating for new keys. This makes sure you have some new keys on<br />

hand by the time the hard limit expires.<br />

• Negotiate As Single Host—If this option is enabled it indicates that every<br />

possible combination <strong>of</strong> source and destination must establish a separate<br />

VPN association. Do not use this option unless directed to do so by Secure<br />

Computing Corporation.<br />

• Forced Rekey—Forces the association to rekey when the limits are<br />

reached, even if no traffic has passed through the VPN since the last rekey.<br />

Important: SCC strongly recommends enabling the Forced Rekey option if<br />

you are using SafeNet S<strong>of</strong>tRemote and have XAUTH configured.<br />

449

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!