![InHand InGateway502 User Manual Download Page 91](http://html1.mh-extra.com/html/inhand/ingateway502/ingateway502_user-manual_2061305091.webp)
87
•
SHA1: generates a 160-bit message digest for a message of a length less than
128 bits.
•
SHA2-256: generates a 256-bit message digest.
•
SHA2-384: generates a 384-bit message digest.
•
SHA2-512: generates a 512-bit message digest.
o
Diffie-Hellman Group: specifies the Diffie-Hellman algorithm, an open key
algorithm. Two parties calculate a shared key based on the data exchanged
between them, without transmitting the key to each other. To encrypt data sent
to each other, the two parties must have a shared key. The essence of Internet
Key Exchange (IKE) is that the communication parties never transmit the key
over an insecure network. Instead, they exchange a series of data to calculate
a shared key. Other parties (such as hackers) cannot calculate the key even if
they intercept all the data exchanged for key calculation.
o
Lifetime: specifies the lifetime of the IKE security association (SA). The two
parties negotiate another SA to replace the old one before the lifetime expires.
•
IKEv2 Policy
o
ID: specifies the ID of an IKEv2 policy.
o
Encryption: specifies the algorithm used to encrypt plain text. Options are
3DES, DES, AES128, AES192, and AES256.
•
3DES: uses three 64-bit DES keys to encrypt plain text.
•
DES: uses a 64-bit key to encrypt a 64-bit plain-text block.
•
AES: uses a 128-bit, 192-bit, or 256-bit key to encrypt plain text.
o
Integrity: specifies the algorithm used to check data integrity. Options are MD5,
SHA1, SHA2-256, SHA2-384, and SHA2-512.
•
MD5: generates a 128-bit message digest for a message of any length.
•
SHA1: generates a 160-bit message digest for a message of a length less than
128 bits.
•
SHA2-256: generates a 256-bit message digest.
•
SHA2-384: generates a 384-bit message digest.
•
SHA2-512: generates a 512-bit message digest.
o
Diffie-Hellman Group: specifies the Diffie-Hellman algorithm, an open key
algorithm. Two parties calculate a shared key based on the data
exchanged between them, without transmitting the key to each other. To
encrypt data sent to each other, the two parties must have a shared key.
The essence of IKE is that the communication parties never transmit the
key over an insecure network. Instead, they exchange a series of data to
Summary of Contents for InGateway502
Page 1: ......
Page 8: ...4 2 2 Structure and Dimensions Figure 2 2 1 Wall Mounting A Figure 2 3 2 Wall Mounting B...
Page 48: ...44 The following figure shows the configuration of an extended access control policy...
Page 49: ...45 The following figure shows the configuration of an access control list...
Page 58: ...54 Once enabled the App automatically runs and will run every time the IG502 is started...
Page 62: ...58 After the update is completed as shown below...
Page 71: ...67...