NB3711 User Manual 4.0
5.6.2. IPsec
IPsec is a protocol suite for securing IP communications by authenticating and encrypt-
ing each packet of a communication session and thus establishing a secure virtual private
network.
IPsec includes various cryptographic protocols and ciphers for key exchange and data
encryption and can be seen as one of the strongest VPN technologies in terms of security.
It uses the following mechanisms:
Mechanism
Description
AH
Authentication Headers (AH) provide connectionless integrity and data origin
authentication for IP datagrams and ensure protection against replay attacks.
ESP
Encapsulating Security Payloads (ESP) provide confidentiality, data-origin
authentication, connectionless integrity, an anti-replay service and limited
traffic-flow confidentiality.
SA
Security Associations (SA) provide a secure channel and a bundle of algo-
rithms that provide the parameters necessary to operate the AH and/or ESP
operations. The Internet Security Association Key Management Protocol
(ISAKMP) provides a framework for authenticated key exchange.
Negotating keys for encryption and authentication is generally done by the Internet Key
Exchange protocol (IKE) which consists of two phases:
Phase
Description
IKE
phase
1
IKE authenticates the peer during this phase for setting up an ISAKMP se-
cure association. This can be carried out by either using
main
or
aggressive
mode. The
main
mode approach utilizes the Diffie-Hellman key exchange and
authentication is always encrypted with the negotiated key.The
aggressive
mode just uses hashes of the pre-shared key and therefore represents a less-
secure mechanism which should generally be avoided as it is prone to dictio-
nary attacks.
IKE
phase
2
IKE finally negotiates IPSec SA parameters and keys and sets up matching
IPSec SAs in the peers which is required for AH/ESP later on.
Administration
This page can be used to enable/disable IPsec, you may also specify whether NAT-
Traversal should be used.
NAT-Traversal is mainly used for connections which traverse a path where a router
97
Summary of Contents for NB3711
Page 90: ...NB3711 User Manual 4 0 Figure 5 27 Inbound NAPT 90...
Page 92: ...NB3711 User Manual 4 0 Figure 5 29 OpenVPN Configuration 92...
Page 96: ...NB3711 User Manual 4 0 Figure 5 30 OpenVPN Client Management 96...
Page 98: ...NB3711 User Manual 4 0 Figure 5 31 IPsec Administration 98...
Page 104: ...NB3711 User Manual 4 0 Figure 5 34 PPTP Tunnel Configuration 104...
Page 114: ...NB3711 User Manual 4 0 Figure 5 37 SDK Administration 114...
Page 117: ...NB3711 User Manual 4 0 Figure 5 38 SDK Jobs 117...
Page 121: ...NB3711 User Manual 4 0 Figure 5 39 DHCP Server 121...
Page 131: ...NB3711 User Manual 4 0 Figure 5 44 SMS Configuration 131...
Page 158: ...NB3711 User Manual 4 0 Figure 5 55 Remote Authentication 158...
Page 162: ...NB3711 User Manual 4 0 Figure 5 57 Automatic File Configuration 162...
Page 166: ...NB3711 User Manual 4 0 Figure 5 59 Log Viewer 166...
Page 167: ...NB3711 User Manual 4 0 Figure 5 60 Tech Support File 167...
Page 175: ...NB3711 User Manual 4 0 5 9 LOGOUT Please use this menu to log out from the Web Manager 175...
Page 213: ...NB3711 User Manual 4 0 Event Description Table A 3 SDK Examples 213...
Page 214: ......