NB3710 User Manual 4.0
5.6.2. IPsec
IPsec is a protocol suite for securing IP communications by authenticating and encrypt-
ing each packet of a communication session and thus establishing a secure virtual private
network.
IPsec includes various cryptographic protocols and ciphers for key exchange and data
encryption and can be seen as one of the strongest VPN technologies in terms of security.
It uses the following mechanisms:
Mechanism
Description
AH
Authentication Headers (AH) provide connectionless integrity and data origin
authentication for IP datagrams and ensure protection against replay attacks.
ESP
Encapsulating Security Payloads (ESP) provide confidentiality, data-origin
authentication, connectionless integrity, an anti-replay service and limited
traffic-flow confidentiality.
SA
Security Associations (SA) provide a secure channel and a bundle of algo-
rithms that provide the parameters necessary to operate the AH and/or ESP
operations. The Internet Security Association Key Management Protocol
(ISAKMP) provides a framework for authenticated key exchange.
Negotating keys for encryption and authentication is generally done by the Internet Key
Exchange protocol (IKE) which consists of two phases:
Phase
Description
IKE
phase
1
IKE authenticates the peer during this phase for setting up an ISAKMP se-
cure association. This can be carried out by either using
main
or
aggressive
mode. The
main
mode approach utilizes the Diffie-Hellman key exchange and
authentication is always encrypted with the negotiated key.The
aggressive
mode just uses hashes of the pre-shared key and therefore represents a less-
secure mechanism which should generally be avoided as it is prone to dictio-
nary attacks.
IKE
phase
2
IKE finally negotiates IPSec SA parameters and keys and sets up matching
IPSec SAs in the peers which is required for AH/ESP later on.
Administration
This page can be used to enable/disable IPsec, you may also specify whether NAT-
Traversal should be used.
NAT-Traversal is mainly used for connections which traverse a path where a router
97
Summary of Contents for NB3710
Page 90: ...NB3710 User Manual 4 0 Figure 5 27 Inbound NAPT...
Page 92: ...NB3710 User Manual 4 0 Figure 5 29 OpenVPN Configuration...
Page 96: ...NB3710 User Manual 4 0 Figure 5 30 OpenVPN Client Management...
Page 98: ...NB3710 User Manual 4 0 Figure 5 31 IPsec Administration...
Page 104: ...NB3710 User Manual 4 0 Figure 5 34 PPTP Tunnel Configuration...
Page 108: ...NB3710 User Manual 4 0 as GSM voice calls they suffer from unreliability and poor bandwidth...
Page 114: ...NB3710 User Manual 4 0 Figure 5 37 SDK Administration...
Page 117: ...NB3710 User Manual 4 0 Figure 5 38 SDK Jobs...
Page 121: ...NB3710 User Manual 4 0 Figure 5 39 DHCP Server...
Page 131: ...NB3710 User Manual 4 0 Figure 5 44 SMS Configuration...
Page 156: ...NB3710 User Manual 4 0 Figure 5 55 Remote Authentication...
Page 160: ...NB3710 User Manual 4 0 Figure 5 57 Automatic File Configuration...
Page 164: ...NB3710 User Manual 4 0 Figure 5 59 Log Viewer...
Page 165: ...NB3710 User Manual 4 0 Figure 5 60 Tech Support File...
Page 173: ...NB3710 User Manual 4 0 5 9 LOGOUT Please use this menu to log out from the Web Manager...
Page 211: ...NB3710 User Manual 4 0 Event Description Table A 3 SDK Examples...