Now Loading

Proget Console

IKEv2

Internet Key Exchange version 2 (IKEv2) is a tunneling protocol, based on IPsec, that establishes a secure VPN communication between VPN devices and defines negotiation and authentication processes for IPsec security associations (SAs).

PROFILE_VPN_IKEV2_MAP
1 IKEV2 General
PROFILE_VPN_IKEV2_GENERAL

1.1 Address
  • Enter the address URL
  • Required

1.2 Disable MOBIKE
  • If checked, MOBIKE is disabled
  • MOBIKE allows to remain connected to the VPN even if user move to a different network

1.3 Dead Peer Detection Rate
  • The frequency at which the IKEv2 client will run the dead peer detection algorithm
  • One of:
    • None
    • Low (every 30 minutes)
    • Medium (every 10 minutes)
    • High (every 1 minute)

1.4 Disable redirect
  • If checked, IKEv2 server redirects are disabled

1.5 Enable certificate revocation check
  • If checked, evocation checking of the IKEv2 server certificate is enabled
  • If checked, during IKEv2 negotiation the certificate identifying the server is checked to see if it has been revoked

1.6 Enable fallback
  • If checked, enable the use of cellular data when Wi-Fi connectivity is poor

1.7 Enable PFS
  • If checked, Perfect Forward Secrecy is enabled

1.8 TLS minimum version
  • One of:
    • 1.0
    • 1.1
    • 1.2

1.9 TLS maximum version
  • One of:
    • 1.0
    • 1.1
    • 1.2

1.10 Identifier
  • Enter the local Identifier of the IKEv2 client
  • Required

1.11 NAT Keepalive interval
  • Enter the frequency in seconds at which gateway sends NAT Keepalive packets to its peer to keep the NAT session alive, so that the peer can access the device
  • Minimum value is 20
  • Maximum value is 1400
  • Required

1.12 Enable NAT Keepalive offload
  • If checked, Keepalive packets will be offloaded to hardware while the device is asleep

1.13 Remote identifier
  • Enter the Remote Identifier of the IKEv2 client
  • Required

1.14 User configuration attribute internal IP subnet
  • If checked, split tunnel configurations won’t be communicated via traffic selectors during IKE negotiation

1.15 Per App VPN
  • If checked, allows to use VPN configuration per application

2 Child SA Params
PROFILE_VPN_IKEV2_CHILD_SA_PARAMS

2.1 Diffie-Hellman group
  • Diffie-Hellman groups determine the strength of the key used in the key exchange process
  • One of:
    • 1
    • 2
    • 5
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 31

2.2 Encryption algorithm
  • Type of encryption algorithm. Defines how strong security will be.
  • One of:
    • DES
    • 3DES
    • 3DAES-128ES
    • AES-256
    • AES-128-GCM
    • AES-256-GCM
    • ChaCha20Poly1305

2.3 Integrity algorithm
  • Type of integrity algorithm. Defines how strong security will be.
  • One of:
    • SHA1-96
    • SHA1-160
    • SHA2-256
    • SHA2-384
    • SHA2-512

2.4 Life time in minutes
  • The duration of the lifetime of the Security Association
  • Minimum value is 10
  • Maximum value is 1440

3 IKE SA Params
PROFILE_VPN_IKEV2_IKE_SA_PARAMS

3.1 Diffie-Hellman group
  • Diffie-Hellman groups determine the strength of the key used in the key exchange process
  • One of:
    • 1
    • 2
    • 5
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 31

3.2 Encryption algorithm
  • Type of encryption algorithm. Defines how strong security will be.
  • One of:
    • DES
    • 3DES
    • 3DES-128ES
    • AES-256
    • AES-128-GCM
    • AES-256-GCM
    • ChaCha20Poly1305

3.3 Integrity algorithm
  • Type of integrity algorithm. Defines how strong security will be.
  • One of:
    • SHA1-96
    • SHA1-160
    • SHA2-256
    • SHA2-384
    • SHA2-512

3.4 Life time in minutes
  • The duration of the lifetime of the Security Association
  • Minimum value is 10
  • Maximum value is 1440

4 Authorization Type – Certificate
PROFILE_VPN_IKEV2_AUTH_CERTIFICATE

4.1 Certificate type
  • One of:
    • RSA
    • ECDSA256
    • ECDSA384
    • ECDSA512
    • Ed25519

4.2 Certificate
  • Type of certificate that is created in Proget system
  • One of:
    • Certificate
    • SCEP

4.3 Certificate profile
  • Name of Certificate profile which will be used
  • Required if ‘Certificate: Certificate’ is chosen

4.4 SCEP profile
  • Name of SCEP profile which will be used
  • Required if ‘Certificate: SCEP’ is chosen

4.5 Server certificate common name
  • Enter a string containing the value of the Subject Common Name field of the IKEv2 server’s certificate

4.6 Server certificate issuer common name
  • Enter a string containing the value of the Subject Common Name field of the Certificate Authority certificate that issued the IKEv2 server”s certificate.

4.7 Extended auth enabled
  • If checked, allows to use extended authorization

4.8 Extended auth type
  • One of:
    • User
    • Certificate
  • Required if ‘Extended auth enabled’ is checked

4.9 User
  • Enter the name of the user
  • Required if ‘Extended auth type: User’ is chosen

4.10 Password
  • Enter the user password
  • Available if ‘Extended auth type: User’ is chosen

5 Authorization Type – Shared secret
PROFILE_VPN_IKEV2_AUTH_SHARED_SECRET

5.1 Shared Secret
  • Enter the common password for VPN connection
  • Required

5.2 Extended auth enabled
  • If checked, allows to use extended authorization

5.3 Extended auth type
  • One of:
    • User
    • Certificate
  • Required if ‘Extended auth enabled’ is checked

5.4 User
  • Enter the name of the user
  • Required if ‘Extended auth type: User’ is chosen

5.5 Password
  • Enter the user password
  • Available if, ‘Extended auth type: User’ is chosen

5.6 Certificate
  • One of:
    • Certificate
    • SCEP
  • Required if ‘Extended auth type: Certificate’ is chosen

5.7 Certificate profile
  • Name of Certificate profile which will be used
  • Required if ‘Certificate: Certificate’ is chosen

5.8 SCEP profile
  • Name of SCEP profile which will be used
  • Required if ‘Certificate: SCEP’ is chosen

6 Authorization Type – None
PROFILE_VPN_IKEV2_AUTH_NONE

6.1 Extended auth enabled
  • If checked, allows to use extended authorization

6.2 Extended auth type
  • One of:
    • User
    • Certificate
  • Required if ‘Extended auth enabled’ is checked

6.3 User
  • Enter the name of the user
  • Required if ‘Extended auth type: User’ is chosen

6.4 Password
  • Enter the user password
  • Available if, ‘Extended auth type: User’ is chosen

6.5 Certificate
  • One of:
    • Certificate
    • SCEP
  • Required if ‘Extended auth type: Certificate’ is chosen

6.6 Certificate profile
  • Chose the name of Certificate profile which will be used
  • Required if ‘Certificate: Certificate’ is chosen

6.7 SCEP profile
  • Chose the name of SCEP profile which will be used
  • Required if ‘Certificate: SCEP’ is chosen

7 IKEV2 Proxy
PROFILE_VPN_IPSEC_PROXY

7.1 Proxy configuration
  • One of:
    • Automatic
    • Manual
  • Proxy servers act as relays between the website you’re visiting and your device

7.2 URL of the proxy auto configuration
  • Enter the URL thought which all browser traffic will be rerouted
  • Required if ‘Proxy configuration: Automatic’ is chosen

7.3 Name or IP address of the proxy auto configuration
  • Enter the IP address or host name of the VPN server
  • Required if ‘Proxy configuration: Manual’ is chosen

7.4 Proxy server port
  • Enter the port number which is a part of the addressing information used to identify the receivers and senders of network messages
  • Minimum value is 0
  • Maximum value is 65535
  • Available if ‘Proxy configuration: Manual’ is chosen

7.5 User
  • Enter the name of user account for proxy authentication
  • Available if ‘Proxy configuration: Manual’ is chosen

7.6 Password
  • Enter the password of user Proxy authorization
  • Available if ‘Proxy configuration: Manual’ is chosen