26
MC Technologies GmbH
Secrecy (PFS)
Lifetime
Hash
Encryption
Phase 2 IPsec SA
Data exchange
Phase 1 ISAKMP SA
IPsec - Internet
Key Exchange
IPsec Connection IKE
Name of the VPN connection.
ISAKMP SA
AES-128 (default). AES-192, AES-256, 3 DES.
Encryption
ISAKMP SA
The setting "all" accepts either MD5 or SHA-1. Hash
ISAKMP SA
Life cycle of a key in seconds (3600 = 1 hour.) Lifetime
Unlike Phase 1 ISAKMP SA (key exchange,) this is where the procedure for
Data exchange is determined It can be different from that of key exchange. IPsec SA
See
ISAKMP SA Encryption
IPsec SA
See ISAKMP SA Encryption.
IPsec SA
Life cycle in seconds of key established for IPsec SA.
28800 seconds = 8 hours (default.)
86400 seconds = 24 hours (maximum).
Perfect Forward
Yes:
Perfect Forward Secrecy activated.
No:
Perfect Forward Secrecy deactivated.
DH/PFS Group
Key exchange procedure (Diffie-Hellman groups for Internet Key Exchange (IKE.))
5/modp1536 = high encryption. 2/modp1024
= normal encryption (default.)
Dead Peer
Recognition of validity and resulting action in case of interruption of IPsec connection.
Detection
No:
No Dead Peer Detection.
Yes:
Dead Peer Detection activated (i.e. Restart at VPN Initiate).
DPD Delay
Time interval to next check.
DPD Timeout Time period after which the connection to the remote peer should be declared inactive.
Default value: 120 seconds.
Maximum:
86400 seconds (24 hours.)