Internet Key Exchange version 2 (IKEv2) is a tunneling protocol, based on IPsec, that establishes a secure VPN communication between VPN devices and defines negotiation and authentication processes for IPsec security associations (SAs).
Address
Enter the address URL
Required
Disable MOBIKE
If checked, MOBIKE is disabled
MOBIKE allows to remain connected to the VPN even if user move to a different network
Dead Peer Detection Rate
The frequency at which the IKEv2 client will run the dead peer detection algorithm
One of:
None
Low (every 30 minutes)
Medium (every 10 minutes)
High (every 1 minute)
Disable redirect
If checked, IKEv2 server redirects are disabled
Enable certificate revocation check
If checked, evocation checking of the IKEv2 server certificate is enabled
If checked, during IKEv2 negotiation the certificate identifying the server is checked to see if it has been revoked
Enable fallback
If checked, enable the use of cellular data when Wi-Fi connectivity is poor
Enable PFS
If checked, Perfect Forward Secrecy is enabled
Identifier
Enter the local Identifier of the IKEv2 client
Required
NAT Keepalive interval
Enter the frequency in seconds at which gateway sends NAT Keepalive packets to its peer to keep the NAT session alive, so that the peer can access the device
Minimum value is 20
Maximum value is 1400
Required
Enable NAT Keepalive offload
If checked, Keepalive packets will be offloaded to hardware while the device is asleep
Remote identifier
Enter the Remote Identifier of the IKEv2 client
Required
User configuration attribute internal IP subnet
If checked, split tunnel configurations won’t be communicated via traffic selectors during IKE negotiation
Per App VPN
If checked, allows to use VPN configuration per application
Diffie-Hellman group
Diffie-Hellman groups determine the strength of the key used in the key exchange process
One of:
1
2
5
14
15
16
17
18
19
20
21
31
Encryption algorithm
Type of encryption algorithm. Defines how strong security will be.
One of:
DES
3DES
3DAES-128ES
AES-256
AES-128-GCM
AES-256-GCM
ChaCha20Poly1305
Integrity algorithm
Type of integrity algorithm. Defines how strong security will be.
One of:
SHA1-96
SHA1-160
SHA2-256
SHA2-384
SHA2-512
Life time in minutes
The duration of the lifetime of the Security Association
Minimum value is 10
Maximum value is 1440
Diffie-Hellman group
Diffie-Hellman groups determine the strength of the key used in the key exchange process
One of:
1
2
5
14
15
16
17
18
19
20
21
31
Encryption algorithm
Type of encryption algorithm. Defines how strong security will be.
One of:
DES
3DES
3DES-128ES
AES-256
AES-128-GCM
AES-256-GCM
ChaCha20Poly1305
Integrity algorithm
Type of integrity algorithm. Defines how strong security will be.
One of:
SHA1-96
SHA1-160
SHA2-256
SHA2-384
SHA2-512
Life time in minutes
The duration of the lifetime of the Security Association
Minimum value is 10
Maximum value is 1440
Certificate type
One of:
RSA
ECDSA256
ECDSA384
ECDSA512
Ed25519
Certificate
Type of certificate that is created in Proget system
One of:
Certificate profile
Name of Certificate profile which will be used
Required if ‘Certificate: Certificate’ is chosen
SCEP profile
Name of SCEP profile which will be used
Required if ‘Certificate: SCEP’ is chosen
Server certificate common name
Enter a string containing the value of the Subject Common Name field of the IKEv2 server’s certificate
Server certificate issuer common name
Enter a string containing the value of the Subject Common Name field of the Certificate Authority certificate that issued the IKEv2 server”s certificate.
Extended auth enabled
If checked, allows to use extended authorization
Extended auth type
One of:
Required if ‘Extended auth enabled’ is checked
User
Enter the name of the user
Required if ‘Extended auth type: User’ is chosen
Password
Enter the user password
Available if ‘Extended auth type: User’ is chosen
Shared Secret
Enter the common password for VPN connection
Required
Extended auth enabled
If checked, allows to use extended authorization
Extended auth type
One of:
Required if ‘Extended auth enabled’ is checked
User
Enter the name of the user
Required if ‘Extended auth type: User’ is chosen
Password
Enter the user password
Available if, ‘Extended auth type: User’ is chosen
Certificate
One of:
Required if ‘Extended auth type: Certificate’ is chosen
Certificate profile
Name of Certificate profile which will be used
Required if ‘Certificate: Certificate’ is chosen
SCEP profile
Name of SCEP profile which will be used
Required if ‘Certificate: SCEP’ is chosen
Extended auth enabled
If checked, allows to use extended authorization
Extended auth type
One of:
Required if ‘Extended auth enabled’ is checked
User
Enter the name of the user
Required if ‘Extended auth type: User’ is chosen
Password
Enter the user password
Available if, ‘Extended auth type: User’ is chosen
Certificate
One of:
Required if ‘Extended auth type: Certificate’ is chosen
Certificate profile
Chose the name of Certificate profile which will be used
Required if ‘Certificate: Certificate’ is chosen
SCEP profile
Chose the name of SCEP profile which will be used
Required if ‘Certificate: SCEP’ is chosen
Proxy configuration
One of:
Proxy servers act as relays between the website you’re visiting and your device
URL of the proxy auto configuration
Enter the URL thought which all browser traffic will be rerouted
Required if ‘Proxy configuration: Automatic’ is chosen
Name or IP address of the proxy auto configuration
Enter the IP address or host name of the VPN server
Required if ‘Proxy configuration: Manual’ is chosen
Proxy server port
Enter the port number which is a part of the addressing information used to identify the receivers and senders of network messages
Minimum value is 0
Maximum value is 65535
Available if ‘Proxy configuration: Manual’ is chosen
User
Enter the name of user account for proxy authentication
Available if ‘Proxy configuration: Manual’ is chosen
Password
Enter the password of user Proxy authorization
Available if ‘Proxy configuration: Manual’ is chosen