add vpn site
Description
Adds a new remote VPN site for Site-to-Site VPN.
Syntax
|
|
|
|
|
Parameters
Parameter |
Description |
---|---|
aggressive-mode-DH-group |
Configures the strength of the key when aggressive mode is enabled |
aggressive-mode-enable-gateway-id |
Indicates if gateway ID matching will be used. This adds a layer of security to aggressive mode. |
aggressive-mode-enable-peer-id |
Indicates if peer ID matching will be used. This adds a layer of security to the aggressive mode. |
aggressive-mode-enabled |
Main mode is used. It is less recommended if the remote site supports IPSec main mode. |
aggressive-mode-gateway-id |
Configures the gateway ID that will be used for matching when configured to |
aggressive-mode-gateway-id-type |
Configures the type of gateway ID that will be used for matching when configured. |
aggressive-mode-peer-id |
Configures the peer ID that will be used for matching when configured to |
aggressive-mode-peer-id-type |
Configures the type of peer ID that will be used for matching when configured |
auth-method |
Configures the type of authentication used when connecting to the remote site Press the TAB key to see the available options. |
disable-nat |
Disables NAT for traffic to/from the remote site. Useful when one of the internal networks contains a server |
enable-perfect-forward-secrecy |
Ensures that a session key will not be compromised if one of the (long-term) private keys is compromised in the future. |
enable-permanent-vpn-tunnel |
VPN Tunnels are constantly kept active and as a result, make it easier to recognize malfunctions and connectivity problems |
enabled |
Configures whether or not the remote site is enabled |
enc-method |
Configures the encryption method:
|
enc-profile |
Specifies the encryption profile (one of predefined profiles or custom) |
is-check-point-site |
Specifies the if the remote site is a Check Point Security Gateway |
is-site-behind-static-nat |
Specifies if the remote site is behind static NAT |
link-selection-multiple-addrs addr |
Configures the IP address |
link-selection-probing-method |
Configures the type of probing used for link selection when multiple IP addresses are configured for the remote site |
match-cert-dn |
Specifies if certificate matching should match the DN string in the certificate to the configured DN string |
match-cert-dn-string |
Configures the configured DN string for certificate matching |
match-cert-e-mail |
Specifies if certificate matching should match the E-mail string in the certificate to the configured E-mail string |
match-cert-e-mail-string |
Configures the E-mail string for certificate matching |
match-cert-ip |
Specifies if certificate matching should match IP address in the certificate to the site's IP address |
name |
Configures the Site name. A string that begins with a letter and contain up to 32 characters without spaces, of this set:
|
password |
Configures the preshared secret (minimum 6 characters) to be used when authentication method is configured as such |
phase1-reneg-interval |
Configures the period (from 5 to 70000 minutes) between each IKE SA renegotiation |
phase2-dh |
Determine the strength of the key used for the IPsec (Phase 2) key exchange process. The higher the group number, the stronger and more secure the key is. |
phase2-reneg-interval |
Configures the period (from 120 to 86400 seconds) between each IPSec SA renegotiation. |
remote-site-enc-dom-type |
Configures the method of defining the remote site's encryption domain Options:
|
remote-site-host-name |
Configures the host name of the remote site |
remote-site-ip-address |
Configures the IPv4 address of the remote site |
remote-site-ipv6-address |
Configures the IPv6 address of the remote site |
remote-site-link-selection |
Configures the method of determining the destination IP address/s of the remote site Press the TAB key to see the available options. |
static-nat-ip |
Configures the external IP address through static NAT used by the remote site |
use-trusted-ca |
Specifies if a specific trusted CA is used for matching the remote site's certificate or all configured trusted CAs |
Example
|