Proroute GEM420 4G M2M Router
GEM420 User Manual
127
There are 4 IKE proposals can be defined by you and used in IKE phase of
negotiation between two VPN peers.
1.
Encryption:
There are six algorithms can be selected: DES, 3DES, AES-auto,
AES-128, AES-192, and AES-256.
2.
Authentication:
There are
five
algorithms can be selected: None, MD5, SHA1,
SHA2-256 and SHA2-512.
3.
DH Group:
There are
nine
groups can be selected: None, Group 1 (MODP768),
Group 2 (MODP1024), Group 5 (MODP1536) and Group14 ~ 18.
4.
Enable:
Check this box to enable the IKE Proposal during tunnel establishing.
3.2.3.1.9 IPSec Phase
1.
Phase 2 Key Life Time
: The value of life time represents the life time of the key
which is dedicated at Phase 2 between two VPN peers.
3.2.3.1.10 IPSec Proposal Definition
There are 4 IPSec proposals can be defined by you and used in IPSec phase of
negotiation between two VPN peers.
1.
Encryption:
There are six algorithms can be selected: DES, 3DES, AES-auto,
AES-128, AES-192, and AES-256.
2.
Authentication:
There are five algorithms can be selected: None, MD5, SHA1,
SHA2-256 and SHA2-512.