1) then configRowIke["IpsecIKEPolicy.XAUTHType1"] = configRowIke["IpsecIKEPolicy.XAUTHType"] configRowIke["IpsecIKEPolicy.XAUTHType"] = "2" end else configRowIke ={} end if(configRowVpn["IpsecVPNPolicy.PFSKeyGroup"] ~= "0") then configRowVpn["IpsecVPNPolicy.PFSKeyGroup1"] = configRowVpn["IpsecVPNPolicy.PFSKeyGroup"] configRowVpn["IpsecVPNPolicy.PFSKeyGroup"] = "1" else configRowVpn["IpsecVPNPolicy.PFSKeyGroup1"] = "2" end if (ACCESS_LEVEL ~= 0) then configRowIke["IpsecIKEPolicy.Presharedkey"] = util.mask(configRowIke["IpsecIKEPolicy.Presharedkey"] or '') end edit = "readonly" end if(configRowIke["IpsecIKEPolicy.Password"] ~= nil) then configRowIke["IpsecIKEPolicy.Password"] = util.mask(configRowIke["IpsecIKEPolicy.Password"]) end ?> $|COMPANY_NAME|$ : $|APP_NAME|$
$| statusMessage |$
IPSEC ConfigurationLogout
$| initialDescription or '' |$
 
General
Policy Name:
Policy Type:
IPSec Mode:
Select Local Gateway:
Remote Endpoint:
 
Enable NetBIOS:
Enable RollOver:
Enable DHCP:
Local IP:
Local Start IP Address:
Local End IP Address:
Local Subnet Mask:
Remote IP:
Remote Start IP Address:
Remote End IP Address:
Remote Subnet Mask:
 
Phase1(IKE SA Parameters)
Exchange Mode:
Direction / Type:
Nat Traversal:
On:
Off:
NAT Keep Alive Frequency (in seconds):
Local Identifier Type:
Local Identifier:
Remote Identifier Type:
Remote Identifier:
Encryption Algorithm:
Authentication Algorithm:
Authentication Method:
Pre-shared key:
Diffie-Hellman (DH) Group:
SA-Lifetime (sec):
Enable Dead Peer Detection:
Detection Period:
Reconnect after failure count:
Extended Authentication:
Authentication Type:
Username:
Password:
 
Phase2-(Manual Policy Parameters)
SPI-Incoming:
SPI-Outgoing:
Encryption Algorithm:
Key Length:
Key-In:
Key-Out:
Integrity Algorithm:
Key-In:
Key-Out:
 
Phase2-(Auto Policy Parameters)
SA Lifetime:
Encryption Algorithm:
Key Length:
Integrity Algorithm:
PFS Key Group:
Helpful Hints...
$| helpfullHints or '' |$