IPsec tunnels

The Z45 Controller supports 8 concurrent IPsec tunnels. For each tunnel the configuration options below are available.

System-wide IPsec tunnel options

Parameter Options
Tunnel Select Tunnel to be configured ( up to 8 )
IPSEC System level Enable/Disable of IPSEC tunnels
Security Level

Allow Internet and Secure Traffic: In this mode IP traffic addressed for the IPsec tunnel will be transmitted through the tunnel. Other traffic will continue to route over the open IP network. This setting allows web type traffic to co-exist with secure traffic on the same Z45 Controller.

Allow Only Secure Traffic: In this mode only IP traffic addressed for the IPsec tunnel will be transmitted. Since this precludes the use of the standard routing feature the Routing button in the main menu is disabled in this mode of operation.

 

Individual IPsec Tunnel Options

The remaining portion of the IPsec configuration deals with tunnel specific parameters meaning that each parameter must be set for each tunnel deployed. The configurable options can be seen in the table below.

Phase 1 and Phase 2 under IPSec Key Exchange refer to IKE Phase 1 and IKE phase 2. During IKE phase 1 IKE authenticates IPSec peers and negotiates IKE Security Associations (SAs), setting up a secure channel for negotiating IPSec SAs in phase 2.During IKE phase 2 IKE negotiates IPSec SA parameters and sets up matching IPSec SAs in the peers. The selection choices with this panel for Phase 1 and Phase 2 are identical but repeated so that different choices can be applied to Phase 1 and Phase 2.

Parameter Options
Tunnel Enable/Disable an individual tunnel
Auto-connect Sends ICMP request as the defined interval in seconds to the router subnet to maintain the tunnel connection alive.
Local Router Definition

Local Security Type: Available option are FQDN, USER FQDN, KEY ID or NONE

Security ID: The identifier corresponding to the selected security type

IP Address: IP address of the remote router

Subnet IP Address/Netmask: IP Address and netmask of remote router

Authentication/Encryption

Pre-Shared Key: Text string used by both ends of the tunnel for authentication.

Exchange Mode: Available settings are Main or Aggressive. Defines the number of exchanges used to complete IKE Phase 1. Main is the more robust setting while aggressive mode uses few exchanges and is therefore somewhat more risky.

Dead Peer Detection (DPD): Defines the intervals (in seconds) between DPD messages following idle periods. A zero (0) setting disables DPD.

IPSEC Key Exchange

Encryption: Choices are 3des, or aes128, aes192, ase256

Authentication: Choices are sha1, or md5.

DH Group: Defines what size modulus to use for Diffie-Hellman calculation. Choices are 768,1024, 1536, or 2048

PFS DH Group: Choices are No PFS, 768, 1024, 1536, or 2048. You specify the Diffie – Hellman group in Phase 2 only when you select Perfect Forward Secrecy (PFS). PFS makes keys more secure because new keys are not made from previous keys. When you specify PFS during Phase 2, a Diffie-Hellman exchange occurs each time a new SA is negotiated. The DH group you choose for Phase 2 does not need to match the group you choose for Phase 1.

SA Lifetime (Phase 1 & Phase 2): The lifetime parameter controls the duration (in minutes) for which the SA is valid. A zero (0) setting disables SA Lifetime timeouts.