Use the following procedure to create an IPSec profile from the Multicloud Defense Controller dashboard:
Procedure
Step 1 | Navigate to . |
Step 2 | Click Create. |
Step 3 | Enter a unique Profile Name. |
Step 4 | (Optional) Enter a Description. This may help differentiate from other profiles with a similar name. |
Step 5 | Enter the appropriate IKE information when prompted:
-
DH Group - Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Expand the drop-down menu to select the appropriate groups for the profile.
-
Authentication - Expand the drop-down menu to select the types of authentication you want for this tunnel.
-
Encryption - Intercepted stacks require encrypting and decrypting. Expand the drop-down menu to select your method of encryption.
-
Hash - SHA1 is a one-way hashing algorithm that produces a 160-bit digest. Use the drop-down menu to select the appropriate option.
-
Key Lifetime - Enter a time value in seconds for how long the key lasts. Avaialble values are between 60 sec and 86400 sec.
-
IKE Version -The Internet Key Exchange (IKE) is a protocol that is used to set up a security association in the IPSec protocol suite that provides robust authentication and encryption of IP packets. Use the drop-down menu to select either IKE version 1 or version 2. There are significant differences between the versions so be sure to select the one most appropriate for your environment.
|
Step 6 | Enter the appropriate IPsec information when prompted:
-
Authentication - Expand the drop-down menu to select an authentication method: None, SHA256, SHA, or Null.
-
Encryption - Expand the drop-down and select a type of key: AES GCM 256, AES GCM 192, or AES GCM. This generates a unique key exchange between the connected devices, so that each device can decrypt the other device's messages.
-
Mode - Expand the drop-down menu to select the IPSec policy authentication protocol. You can select more than one.
|
What to do next
Attach the profile to a policy rule set. See Rule Sets and Rule Set Groups for more information.