Virtual Private Networking Using IPSec
and
L2TP Connections
261
ProSAFE Gigabit Quad WAN SSL VPN Firewall SRX5308
8.
Click 
Apply
to use the new settings immediately, and click 
Save
to keep the settings for 
future use.
Create the Mode Config IPSec Configuration (Phase 2 Settings)
Note:
On the VPN firewall, the IPSec configuration (phase 2 settings) is 
referred to as the IKE settings.
To create an IPSec configuration:
1.
In the tree list pane of the Configuration Panel screen, right-click the 
GW_ModeConfig
authentication phase name, and select 
New Phase 2
.
2.
Change the name of the IPSec configuration (the default is Tunnel):
a.
Right-click the IPSec configuration name.
b.
Select 
Rename
.
c.
Type 
Tunnel_ModeConfig
.
d.
Click anywhere in the tree list pane.
Note:
This is the name for the IPSec configuration that is used only for the 
VPN client, not during IPSec negotiation. You can view and change this name 
in the tree list pane. This name needs to be a unique name.
The IPSec pane displays in the 
Configuration Panel screen, with the IPSec tab selected 
by default:
NAT-T
Select 
Automatic
from the drop-down list to enable the VPN client and VPN 
firewall to negotiate NAT-T.
Local and Remote ID
Local ID
As the type of ID, select 
DNS
from the Local ID drop-down list because you 
specified FQDN in the VPN firewall configuration.
As the value of the ID, enter 
client.com
as the local ID for the VPN client.
Note:
The remote ID on the VPN firewall is the local ID on the VPN client. 
Remote ID
As the type of ID, select 
DNS
from the Remote ID drop-down list because you 
specified an FQDN in the VPN firewall configuration.
As the value of the ID, enter 
router.com
as the remote ID for the VPN firewall.
Note:
The local ID on the VPN firewall is the remote ID on the VPN client. 
Table 62. 
VPN client advanced authentication settings (Mode Config) (continued)
Setting
Description