The Monitoring>Session>Details window enables the administrator to view more in-depth information about the session, such as the hashing algorithm, authentication mode, encryption algorithm, and DH group. The top line is the remote access session entry from the previous window, Monitoring>Sessions> Remote Access Sessions. Below the remote entry session, the window is divided into IKE and IPSec sessions.
The first session is the IKE session. This part displays the details of the IKE tunnel establishment. It displays such details as hashing algorithm, encryption algorithm, authentication method, rekey interval, DH group, and IKE negotiation mode. The next two sections detail the IPSec sessions. Displayed are the attributes of the IPSec session to include the local and remote IP address, hashing and encryption algorithms, encapsulation mode, Rekey interval, and so on.
In the figure, the tunnel is established between the public interfaces of the Concentrator and the Hardware Client as documented under the first IPSec session. When traffic flows, it flows between any address on the central site LAN and hosts on the Hardware Client private network, 192.168.10.10/0.0.0.255, as documented under the second IPSec session. In this case, any hosts on the Hardware Client are addressable from the central site.
Was this article helpful?