1Launch the Secure Policy Editor. Start/Programs/SafeNet Soft-PK/Security Policy Editor (Alternatively, you can right click on the SN icon, which should be in the system tray. A menu will pop up and you can choose Secure Policy Editor)
Select Options/Global Policy Settings. Change the Retransmit Interval (seconds) from 15 to at least 30 (I recommend 45)
Click OK to close that window
Select Edit/Add/Connection
This will create a new connection, which you may title whatever you like
Click the “+” next to your newly created connection
Click the “+” next to Security Policy
Click the “+” next to Authentication (Phase 1)
Click the “+” next to Key Exchange (Phase 2)
Highlight Security Policy and check Aggressive Mode under “Select Phase 1 Negotiation Mode”. Click on the floppy disk icon to save changes
Highlight the name of your new connection
In the Connection Security section, select “Secure” (default)
In the Remote Party Identity and Addressing section, select ID Type “IP Subnet”
Type in the IP Address of the
LAN port of the Firewall in the Subnet: field
Type in the subnet mask of the
LAN port of the Firewall in the Mask: field
Under Protocol, select “All” to allow IP traffic through the VPN tunnel (default)
Check the box “Connect using Secure Gateway Tunnel”
Under that box, choose ID Type: Domain Name and enter the Unique Firewall Identifier located in the Firewall’s VPN Summary tab (for example, “00301E05201D”)
In the IP Address field enter the WAN IP Address of the Firewall. Save your changes
Highlight “My Identity”
In the My Identity section, click on the “Pre-Shared Key” button. Then, click the Enter Key button
Enter your “Pre-Shared Key”. This shared secret must be a minimum of 8 characters (for DES) or 24 characters (for 3DES) in length and will match the shared secret on the VPN Firewall
Click OK to close that window
From the “Select Certificate” drop down menu, select “None” (default)
From the “ID Type” drop down menu, choose “Domain Name” and enter any name you like (does not matter, so long as you put something in there)
In the “Internet Interface” section, select your ethernet NIC (or PPP addapter if using dial up networking). The IP Addr field will be set to the IP address assigned to your NIC. Save your changes
Highlight “Security Policy”
Leave unchecked the “Enable Perfect Forward Secrecy (PFS)” option (default), but check the “Enable Replay Detection” option (default). Save your changes
Highlight “Proposal 1” under “Authentication (Phase 1)”
In the Authentication Method and Algorithms section locate the Authentication Method drop down menu and select “Pre-Shared Key” (default)
In the Encryption and Data Integrity Algorithms section, select DES or Triple DES as the Encrypt Alg. (this will be determined by what was set on the firewall)
From the Hash Alg pull down menu, select “MD5”
From the SA Life, select “Unspecified” (default)
Leave the Key Group at “Diffe-Hellman Group 1” (default). Save your changes
Highlight “Proposal 1” under Key Exchange (phase 2)
Leave the SA Life set to “Unspecified” (default) and the Compression to “None” (default)
Check the box next to Encapsulation Protocol (ESP) (default)
Set the Encrypt Alg to DES or Triple DES (again, this follows whatever the firewall is set to)
Set the Hash Alg to “MD5”
Set the Encapsulation to “Tunnel” (default)
Make sure the “Authentication Protocol (AH)” check box is unchecked (default). Save your changes