4. CONFIGURATION
Continued from previous page
Item
Description
Local Protocol/Port
Specifies Procokol/Port of a local network. The general form is
protocol
/
port
, for example 17/1701 for UDP (protocol 17) and
port 1701. It is also possible to enter only the number of protocol,
however, the above mentioned format is preferred.
Encapsulation Mode
IPsec mode (the method of encapsulation) – choose
tunnel
(en-
tire IP datagram is encapsulated) or
transport
(only IP header).
NAT traversal
If address translation is used between two end points of the tun-
nel, it needs to enable
NAT Traversal
.
IKE Mode
Defines mode for establishing connection (
main
or
aggressive
).
If the aggressive mode is selected, establishing of IPsec tunnel
will be faster, but encryption will set permanently on 3DES-MD5.
We recommend not to use
aggressive
mode due to a lower
security!
IKE Algorithm
Way of algorithm selection:
•
auto
– encryption and hash alg. are selected automatically
•
manual
– encryption and hash alg. are defined by the user
IKE Encryption
Encryption algorithm – 3DES, AES128, AES192, AES256
IKE Hash
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512
IKE DH Group
Diffie-Hellman groups determine the strength of the key used in
the key exchange process. Higher group numbers are more se-
cure, but require additional time to compute the key. Group with
higher number provides more security, but requires more pro-
cessing time.
ESP Algorithm
Way of algorithm selection:
•
auto
– encryption and hash alg. are selected automatically
•
manual
– encryption and hash alg. are defined by the user
ESP Encryption
Encryption algorithm – DES, 3DES, AES128, AES192, AES256
ESP Hash
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512
PFS
Ensures that derived session keys are not compromised if one of
the private keys is compromised in the future
PFS DH Group
Diffie-Hellman group number (see
IKE DH Group
)
Key Lifetime
Lifetime key data part of tunnel. The minimum value of this pa-
rameter is 60 s. The maximum value is 86400 s.
Continued on next page
52
Summary of Contents for V3
Page 1: ...Configuration Manual for v3 Routers ...
Page 17: ...3 STATUS Figure 2 Mobile WAN status 8 ...
Page 20: ...3 STATUS Figure 4 WiFi Scan 11 ...
Page 37: ...4 CONFIGURATION Figure 17 Mobile WAN configuration 28 ...
Page 64: ...4 CONFIGURATION Figure 36 IPsec tunnels configuration 55 ...
Page 91: ...4 CONFIGURATION Figure 59 Example 2 USB port configuration 82 ...