ER75s
Continued from previous page
Item
Description
IKE Mode
Defines mode for establishing connection (
main
or
aggressive
).
If the
aggressive
mode is selected, establishing of IPsec tunnel
will be faster, but encryption will set permanently on 3DES-MD5.
IKE Algorithm
Way of algorithm selection:
•
auto
– encryption and hash alg. are selected automatically
•
manual
– encryption and hash alg. are defined by the user
IKE Encryption
Encryption algorithm – 3DES, AES128, AES192, AES256
IKE Hash
Hash algorithm – MD5 or SHA1
IKE DH Group
Diffie-Hellman groups determine the strength of the key used in
the key exchange process. Higher group numbers are more se-
cure, but require additional time to compute the key. Group with
higher number provides more security, but requires more pro-
cessing time.
ESP Algorithm
Way of algorithm selection:
•
auto
– encryption and hash alg. are selected automatically
•
manual
– encryption and hash alg. are defined by the user
ESP Encryption
Encryption algorithm – DES, 3DES, AES128, AES192, AES256
ESP Hash
Hash algorithm – MD5 or SHA1
PFS
Ensures that derived session keys are not compromised if one of
the private keys is compromised in the future
PFS DH Group
Diffie-Hellman group number (see
IKE DH Group
)
Key Lifetime
Lifetime key data part of tunnel. The minimum value of this pa-
rameter is 60s. The maximum value is 86400 s.
IKE Lifetime
Lifetime key service part of tunnel. The minimum value of this
parameter is 60s. The maximum value is 86400 s.
Rekey Margin
Specifies how long before connection expiry should attempt
to negotiate a replacement begin. The maximum value must be
less than half the parameters IKE and Key Lifetime.
Rekey Fuzz
Specifies the maximum percentage by which should be randomly
increased to randomize re-keying intervals
DPD Delay
Defines time after which is made IPsec tunnel verification
DPD Timeout
By parameter DPD Timeout is set timeout of the answer
Continued on next page
63
Summary of Contents for ER75s
Page 1: ...EDGE router ER75s USER MANUAL ...
Page 40: ...ER75s Figure 24 Topology of example LAN configuration 1 32 ...
Page 54: ...ER75s Figure 33 Mobile WAN configuration 46 ...
Page 59: ...ER75s Figure 38 Firewall configuration 51 ...
Page 76: ...ER75s Figure 49 IPsec tunnels configuration 68 ...
Page 78: ...ER75s Figure 53 Topology of GRE tunnel configuration 70 ...