1-14
VPN 3002 Hardware Client Getting Started
OL-2854-01
Chapter 1 Understanding the VPN 3002 Hardware Client
VPN Software Features Summary
VPN Software Features Summary
The VPN 3002 incorporates the following software features:
VPN Feature
Description
Tunneling protocols
IPSec Protocol. The VPN 3002 uses the IKE and XAUTH protocols for secure
key exchange and authentication, and to create secure VPN tunnels. The VPN
3002 can connect to the VPN Concentrator using standard IPSec, NAT-T,
IPSec over TCP, or IPSec over UDP.
Encryption algorithms
•
56-bit DES (Data Encryption Standard)
•
168-bit Triple DES
•
128-, 192-, and 256-bit AES
Authentication
algorithms
•
HMAC (hashed message authentication coding) with MD5 (message
digest 5)
•
HMAC with SHA-1 (secure hash algorithm)
Key management
•
IKE (Internet Key Exchange, formerly called ISAKMP/Oakley) with
Diffie-Hellman key technique
Network addressing
support
•
DNS (Domain Name System)
•
DHCP (Dynamic Host Configuration Protocol)
•
PPP over Ethernet (PPPoE)
Certificate authorities
•
Baltimore
•
Entrust
•
Microsoft Windows 2000
•
Netscape
•
RSA Keon
•
VeriSign