Cerberus Wi-Fi Lite (P6381-0)
48
Back
– Click
Back
to return to the main VPN setup screen.
Help
– Click
Help
to display on-line help information in a pop-up screen.
Advanced VPN Settings for IKE
To configure phase 1 and phase 2 IKE security settings for a VPN rule, click
Advanced
in the
Edit
screen. There are two phases for an IKE negotiation before a VPN tunnel is established.
During phase 1 negotiation, two VPN devices exchange security parameters (such as the
authentication and encryption algorithms, etc.). After phase 1 negotiation, an SA (Security
Association) is created. The SA is then used for phase 2 negotiation where the security keys
are exchanged.
Phase 1
– Set the fields for phase 1 negotiation.
Negotiation Mode
– For negotiation, the Wireless-G Router uses
Main mode
that also
encrypts the ID type and content (you specify in the
VPN Setup
–
Edit
screen) for maximum
security.
Encryption Algorithm
– Specify the encryption algorithm for this VPN rule. Choices are
3DES
and
AES128
(faster).
Authentication Algorithm
– Specify the encryption algorithm for this VPN rule. Choices are
MD5
and
SHA1
(more secure).
Key Group
– Select the Diffie-Hellman (DH) encryption protocol to generate a secret key.
Choices are
DH1(modp768)
,
DH2(modp1024)
and
DH5(modp1536)
. The higher the group
number, the higher the security.
Key Life Time
– Specify the time (in seconds) before the Wireless-G Router updates the key
with the remote VPN gateway. A short key life time increases security as it forces the two VPN
gateways to update the keys regularly. However, during the key update process, the VPN
tunnel(s) will be disrupted temporary.
Summary of Contents for Cerberus Wi-Fi Lite
Page 4: ......