Configuring IPsec VPN tunnel with another device

You can create a secure tunnel between two LANs secured by a firewall.

This article describes creating an IPsecInternet Protocol security - A network protocol used to encrypt and secure data sent over a network. VPN tunnelKerio Control includes a VPN tunnel which allows to distributed offices to interconnect their offices securely. between Kerio Control and another device.

Before you start, read the topic which describes Kerio Control settings. For more information refer to Configuring IPsec VPN tunnel.

Default values in Kerio Control

This section includes default and supported values for IPsec implemented in Kerio Control.

Both endpoints should be able to communicate automatically. If a problem occurs and you have to set the values manually, consult the following tables for default and supported values in Kerio Control.

For more information refer to Configuring ciphers in key exchange (IKE).

The default values are used by Kerio Control. Remote endpoints of the tunnel can also use the supported values.

Phase 1 (IKE):

Variable Default values Supported values Unsupported values
mode main aggressive
remote ID type hostname IP addressAn identifier assigned to devices connected to a TCP/IP network.

NATNetwork address translation - A method that remaps IP addresses by changing network address information. traversal enabled
ciphersuite (policies) aes128-sha1-modp2048,3des-sha1-modp1536
version IKEv1
DPD timeouts enabled (150 sec)
lifetime 3 hours

Phase 2 (ESP):

Variable Supported values Unsupported values
mode tunnel transport
protocol ESP AH
ciphersuite (policies) aes128-sha1, 3des-sha1
PFS off
lifetime 60 mins

Supported ciphers

Each cipher consists of three parts:

  • Encryption Algorithm — for example, aes128
  • Integrity Algorithm — for example, sha1
  • Diffie Hellman Groups — for example, modp2048

Kerio Control supports the following ciphers:

Phase 1 (IKE) - supported ciphers

Encyption Algorithms Integrity Algorithms Diffie Hellman Groups

aes128 or aes (128 bit AES-CBC)

aes192 (192 bit AES-CBC)

aes256 (256 bit AES-CBC)

3des (168 bit 3DES-EDE-CBC)

md5 (MD5 HMAC)

sha1 or sha (SHA1 HMAC)

sha2_256 or sha256 (SHA2_256_128 HMAC)

sha2_384 or sha384 (SHA2_384_192 HMAC)

sha2_512 or sha512 (SHA2_512_256 HMAC)

2 (modp1024)

5 (modp1536)

14 (modp2048)

15 (modp3072)

16 (modp4096)

18 (modp8192)

22 (modp1024s160)

23 (modp2048s224)

24 (modp2048s256)

Phase 2 (ESP) - supported ciphers

Encyption Algorithms Integrity Algorithms Diffie Hellman Groups

aes128 or aes (128 bit AES-CBC)

aes192 (192 bit AES-CBC)

aes256 (256 bit AES-CBC)

3des (168 bit 3DES-EDE-CBC)

blowfish256 (256 bit Blowfish-CBC)

md5 (MD5 HMAC)

sha1 or sha (SHA1 HMAC)

aesxcbc (AES XCBC)

none (no PFS)

2 (modp1024)

5 (modp1536)

14 (modp2048)

15 (modp3072)

16 (modp4096)

18 (modp8192)

22 (modp1024s160)

23 (modp2048s224)

24 (modp2048s256)