IKEv2
Internet Key Exchange version 2 (IKEv2) is a tunneling protocol, based on IPsec, that establishes a secure VPN communication between VPN devices and defines negotiation and authentication processes for IPsec security associations (SAs).
Enter the address URL
Required
If checked, MOBIKE is disabled
MOBIKE allows to remain connected to the VPN even if user move to a different network
The frequency at which the IKEv2 client will run the dead peer detection algorithm
One of:
None
Low (every 30 minutes)
Medium (every 10 minutes)
High (every 1 minute)
If checked, IKEv2 server redirects are disabled
If checked, evocation checking of the IKEv2 server certificate is enabled
If checked, during IKEv2 negotiation the certificate identifying the server is checked to see if it has been revoked
If checked, enable the use of cellular data when Wi-Fi connectivity is poor
If checked, Perfect Forward Secrecy is enabled
Enter the local Identifier of the IKEv2 client
Required
Enter the frequency in seconds at which gateway sends NAT Keepalive packets to its peer to keep the NAT session alive, so that the peer can access the device
Minimum value is 20
Maximum value is 1400
Required
If checked, Keepalive packets will be offloaded to hardware while the device is asleep
Enter the Remote Identifier of the IKEv2 client
Required
If checked, split tunnel configurations won’t be communicated via traffic selectors during IKE negotiation
If checked, allows to use VPN configuration per application
Diffie-Hellman groups determine the strength of the key used in the key exchange process
One of:
1
2
5
14
15
16
17
18
19
20
21
31
Type of encryption algorithm. Defines how strong security will be.
One of:
DES
3DES
3DAES-128ES
AES-256
AES-128-GCM
AES-256-GCM
ChaCha20Poly1305
Type of integrity algorithm. Defines how strong security will be.
One of:
SHA1-96
SHA1-160
SHA2-256
SHA2-384
SHA2-512
The duration of the lifetime of the Security Association
Minimum value is 10
Maximum value is 1440
Diffie-Hellman groups determine the strength of the key used in the key exchange process
One of:
1
2
5
14
15
16
17
18
19
20
21
31
Type of encryption algorithm. Defines how strong security will be.
One of:
DES
3DES
3DES-128ES
AES-256
AES-128-GCM
AES-256-GCM
ChaCha20Poly1305
Type of integrity algorithm. Defines how strong security will be.
One of:
SHA1-96
SHA1-160
SHA2-256
SHA2-384
SHA2-512
The duration of the lifetime of the Security Association
Minimum value is 10
Maximum value is 1440
One of:
RSA
ECDSA256
ECDSA384
ECDSA512
Ed25519
Type of certificate that is created in Proget system
One of:
Name of Certificate profile which will be used
Required if ‘Certificate: Certificate’ is chosen
Name of SCEP profile which will be used
Required if ‘Certificate: SCEP’ is chosen
Enter a string containing the value of the Subject Common Name field of the IKEv2 server’s certificate
Enter a string containing the value of the Subject Common Name field of the Certificate Authority certificate that issued the IKEv2 server”s certificate.
If checked, allows to use extended authorization
One of:
Required if ‘Extended auth enabled’ is checked
Enter the name of the user
Required if ‘Extended auth type: User’ is chosen
Enter the user password
Available if ‘Extended auth type: User’ is chosen
Enter the common password for VPN connection
Required
If checked, allows to use extended authorization
One of:
Required if ‘Extended auth enabled’ is checked
Enter the name of the user
Required if ‘Extended auth type: User’ is chosen
Enter the user password
Available if, ‘Extended auth type: User’ is chosen
One of:
Required if ‘Extended auth type: Certificate’ is chosen
Name of Certificate profile which will be used
Required if ‘Certificate: Certificate’ is chosen
Name of SCEP profile which will be used
Required if ‘Certificate: SCEP’ is chosen
If checked, allows to use extended authorization
One of:
Required if ‘Extended auth enabled’ is checked
Enter the name of the user
Required if ‘Extended auth type: User’ is chosen
Enter the user password
Available if, ‘Extended auth type: User’ is chosen
One of:
Required if ‘Extended auth type: Certificate’ is chosen
Chose the name of Certificate profile which will be used
Required if ‘Certificate: Certificate’ is chosen
Chose the name of SCEP profile which will be used
Required if ‘Certificate: SCEP’ is chosen
One of:
Proxy servers act as relays between the website you’re visiting and your device
Enter the URL thought which all browser traffic will be rerouted
Required if ‘Proxy configuration: Automatic’ is chosen
Enter the IP address or host name of the VPN server
Required if ‘Proxy configuration: Manual’ is chosen
Enter the port number which is a part of the addressing information used to identify the receivers and senders of network messages
Minimum value is 0
Maximum value is 65535
Available if ‘Proxy configuration: Manual’ is chosen
Enter the name of user account for proxy authentication
Available if ‘Proxy configuration: Manual’ is chosen
Enter the password of user Proxy authorization
Available if ‘Proxy configuration: Manual’ is chosen