Purpose: Add IPsec policies to configure the IKE encryption and authentication algorithms used for site-to-site VPN connections.
Location: Gateways > (gateway name) > Site-to-Site VPN > Policies
- 
                Click Add.
                 
                    The Add/Edit IPSec Policy window opens. 
- Specify a name for the new IPsec policy.
- 
                Select the IKE encryption algorithm from
                    the drop-down list box.
                 
                    Note:The Digital Encryption Standard (DES) is a 64-bit block algorithm that uses a 56-bit key. The Advanced Encryption Standard (AES) is a private key algorithm supporting key lengths from 128 to 256 bits and variable-length blocks of data. Option Description 3DES Triple-DES, in which plain text is encrypted three times by three keys. AES 128 A 128-bit block Cipher Block Chaining (CBC) algorithm that uses a 128-bit key. AES 192 A 128-bit block Cipher Block Chaining (CBC) algorithm that uses a 192-bit key. AES 256 A 128-bit block Cipher Block Chaining (CBC) algorithm that uses a 256-bit key. 
- 
                Select the IKE authentication
                        algorithm value from the drop-down list box. 
                - 
                        MD5—Message Digest (version 5) hash algorithm (on one-way hash function) developed by RSA Data Security, which is intended for digital signature applications, where a large file must be compressed in a secure manner before being encrypted with a private key/public key algorithm. 
- 
                        SHA1—Secure Hash Algorithm 1, which produces a 160-bit message digest. The large message digest provides security against brute-force collision and inversion attacks. 
- 
                        SHA-256—Secure Hash Algorithm 2 with a 256-bit digest. SHA2 digests provide higher security against brute-force collision and inversion attacks. 
- 
                        SHA-512—Secure Hash Algorithm 2 with a 512-bit message digest. The largest message digests provide the highest security against brute-force collision and inversion attacks. 
 
- 
                        
- Select the IKE SA lifetime value (in hours, maximum 24) from the drop-down list box (1-24). It specifies the length of time that the negotiated key will stay effective.
- 
                Select the IKE DH group value from the
                    drop-down list box that are supported by secure gateways. 
                - 
                        Group2: MODP—1024 bits (default) 
- 
                        Group5: MODP—1536 bits 
- 
                        Group14:MODP—2048 bits The above groups refer to the Diffie-Hellman key computation (also known as exponential key agreement) that is based on the Diffie-Hellman (DH) mathematical groups supported by a security gateway for IKE and IPsec Security Association (SA). 
 
- 
                        
- 
                Select the IPsec encryption value from the
                    drop-down list box. 
                - No encryption—Do not use an encryption algorithm.
- 3DES
- AES 128
- AES 192
- AES 256
 
- 
                Select the IPsec authentication algorithm
                    value from the drop-down list box.
                - MD5
- SHA1
- SHA-256
- SHA-512
 
- Select the IPsec lifetime value (in hours, maximum 24) from the drop-down list box (1-24).
- 
                Select the IPsec PFS group value from the
                    drop-down list.
                - None
- Group2: MODP
- Group5: MODP
- Group14:MODP
 
- Click Save.
 
		