4. CONFIGURATION
Continued from previous page
Item
Description
IKE DH Group
Specifies the Diffie-Hellman groups which determine the strength
of the key used in the key exchange process. Higher group num-
bers are more secure, but require additional time to compute the
key.
ESP Algorithm
Specifies the means by which the router selects the algorithm:
•
auto
– The encryption and hash algorithm are selected au-
tomatically.
•
manual
– The encryption and hash algorithm are defined
by the user.
ESP Encryption
Encryption algorithm – DES, 3DES, AES128, AES192, AES256.
ESP Hash
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512.
PFS
Enables/disables the Perfect Forward Secrecy function. The
function ensures that derived session keys are not compromised
if one of the private keys is compromised in the future.
PFS DH Group
Specifies the Diffie-Hellman group number (see
IKE DH Group
).
Key Lifetime
Lifetime key data part of tunnel. The minimum value of this pa-
rameter is 60 s. The maximum value is 86400 s.
IKE Lifetime
Lifetime key service part of tunnel. The minimum value of this
parameter is 60 s. The maximum value is 86400 s.
Rekey Margin
Specifies how long before a connection expires that the router
attempts to negotiate a replacement. Specify a maximum value
that is less than half of IKE and Key Lifetime parameters.
Rekey Fuzz
Percentage of time for the Rekey Margin extension.
DPD Delay
Time after which the IPsec tunnel functionality is tested.
DPD Timeout
The period during which device waits for a response.
Authenticate Mode
Specifies the means by which the router authenticates:
•
Pre-shared key
– Sets the shared key for both sides of the
tunnel.
•
X.509 Certificate
– Allows X.509 authentication in multi-
client mode.
Pre-shared Key
Specifies the shared key for both sides of the tunnel. The prereq-
uisite for entering a key is that you select pre-shared key as the
authentication mode.
Continued on next page
63
Summary of Contents for SPECTRE V3
Page 1: ...Configuration Manual for v3 Routers ...
Page 22: ...3 STATUS Figure 4 WiFi Scan 13 ...
Page 32: ...4 CONFIGURATION Figure 12 Example 1 LAN Configuration Page 23 ...
Page 37: ...4 CONFIGURATION Figure 19 Example of VRRP configuration backup router 28 ...
Page 44: ...4 CONFIGURATION Figure 20 Mobile WAN Configuration 35 ...
Page 51: ...4 CONFIGURATION Figure 25 WiFi Configuration 42 ...
Page 74: ...4 CONFIGURATION Figure 39 IPsec Tunnels Configuration 65 ...
Page 105: ...4 CONFIGURATION Figure 63 Example 2 USB port configuration 96 ...