[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Configuring an IKE Gateway and Peer Authentication—Quick Configuration

You can use J-Web Quick Configuration to quickly configure an IKE Gateway.

Before You Begin

For background information, read

Figure 91 shows the quick configuration page where you can select an existing gateway, or click Add to create a new one.

Figure 91: IKE Gateway Configuration

Image QC_ike.gif

 

Figure 92 shows the quick configuration page where you create a new IKE gateway.

Figure 92: IKE Gateway and Peer Authentication Options

Image QC_ike_gw.gif

To configure an IKE gateway with Quick Configuration:

  1. In the J-Web user interface, select Configuration > Quick Configuration > VPN > IKE.
  2. Select the IKE Gateway tab if it is not selected.
  3. To use an existing gateway, select one from among those listed and click one of the following buttons:
  4. To configure a new IKE gateway, click Add.
  5. Fill in the options as described in Table 62.
  6. Click one of the following buttons:

Table 62: IKE Gateway and Peer Authentication Options

Field

Function

Action

IKE Gateway

Name

Name of the destination peer gateway, specified as an alphanumeric string

Enter a name.

IKE Policy

The IKE policy to be used for communication with the destination peer gateway.

Select the IKE policy to use for the peer gateway

External Interface

Name of the interface to be used to send traffic to the IPsec VPN.

Specify the outgoing interface for IKE SAs. This interface is associated with a zone that acts as its carrier, providing firewall security for it.

NAT Keepalive Interval

The interval at which NAT keepalive packets can be sent so that NAT translation continues.

Specify a maximum interval in seconds at which NAT keepalive packets can be sent.Range: 1 through 300 seconds.Default: 5 seconds.

Disable NAT Traversal

Disables UDP encapsulation of IPsec Encapsulating Security Payload (ESP) packets, otherwise known as Network Address Translation Traversal (NAT-T). NAT-T is enabled by default.

Click the check box to disable or enable.

Local Identity

The local IKE identity to send in the exchange with the destination peer so that the destination peer can communicate with the local peer. If you do not configure a local-identity, the device uses the IP address corresponding to the local endpoint.You can identify the local identity in either of the following ways:

  • IP Address—IPv4 IP address to identify the dynamic peer.
  • Hostname—Fully qualified domain name (FQDN) to identify the dynamic peer.
  • User at Hostname—E-mail address to identify the dynamic peer.
  • Distinguished Name—Name to identify the dynamic peer. The distinguished name appears in the subject line of the Public Key Infrastructure (PKI) certificate. For example: Organization: juniper, Organizational unit: slt, Common name: common.

Specify an IP address, hostname, user-at-hostname, or distinguished name.

Remote Identifier

Provides information about remote peer.

Click the check box to expand the field.

Address

Static address or hostname of remote peer.

Specify one primary and up to four backups.

Dynamic

Dynamic address of remote peer.

Select.

Connections limit

Maximum number of concurrent connections allowed.

Specify the maximum number of concurrent users that can be connected to the gateway. When the maximum number of connections is reached, no more dynamic VPN endpoint dial-up users attempting to access an IPsec VPN are allowed to begin Internet Key Exchange (IKE) negotiations.

IKE user type

  • group-ike-id— E-mail address or fully qualified domain name (FQDN) shared for a group of remote access users so that each one does not need a separate IKE profile configured.
  • shared-ike-id—Email address shared for a large number of remote access users so that each one does not need a separate IKE profile configured.

Select the type of IKE user for a remote access connection.

Remote id type

Type of identifier for remote peer.

Select IP Address, Hostname, User at hostname, or Distinguished name.

IP Address

Use an IPv4 IP address to identify the dynamic peer.

Enter an IP address.

Hostname

Use a fully qualified domain name (FQDN) to identify the dynamic peer.

Select and enter the FQDN.

User at hostname

Use an e-mail address to to identify the dynamic peer.

Select and enter the remote identity as an e-mail address.

Distinguished name

Use a distinguished name to identify the dynamic peer. The distinguished name appears in the subject line of the Public Key Infrastructure (PKI) certificate. For example: Organization: juniper, Organizational unit: slt, Common name: common.

Select and specify a container or a wildcard.

container

The distinguished name of the remote peer.

Enter the distinguished name string exactly as it appears in the certificate.

wildcard

All or part of the distinguished name of the remote peer.

Enter all or parts of a distinguished name, in any order.

Dead Peer Detection

Enabled DPD

RFC 3706 Dead Peer Detection.

Click the check box.

Always Send

Instructs the device to send dead peer detection (DPD) requests regardless of whether there is outgoing IPsec traffic to the peer.

Click the check box.

Interval

The amount of time that the peer waits for traffic from its destination peer before sending a dead peer detection (DPD) request packet.

Enter the interval at which to send DPD messages. Range: 1 through 60 seconds.

Threshold

The maximum number of unsuccessful dead peer detection (DPD) requests that can be sent before the peer is considered unavailable.

Enter the maximum number of unsuccessful DPD requests to be sent. Range: 1 through 5. Default: 5.

XAuth

Access Profile

Provides extended authentication (XAuth), in addition to IKE authentication for remote users trying to access a VPN tunnel.

Select a previously created access profile to reference for authentication information.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]