UTT Technologies
Chapter 10 VPN
http://www.uttglobal.com
Page
18218218
There are five basic DH groups (UTT VPN gateway supports DH groups 1, 2, and 5).
Each DH group has a different size modulus. A larger modulus provides higher security,
but requires more processing time to generate the key. The modulus of DH groups 1, 2,
and 5 are as follows:
●
DH Group 1: 768-bit modulus
●
DH Group 2: 1024-bit modulus
●
DH Group 5: 1536-bit modulus
Note
Both endpoints of an IPSec tunnel should use the same DH group because each
group has a different size modulus.
In the Web UI, you can go to the
VPN > IPSec > IPSec Settings
page to click the
Advanced Options
hyperlink to select DH groups by
Encrypt/Auth Algorithms 1
~
Encrypt/Auth Algorithms 4 (Phase 1)
(section 6.1.2.2).
2. IKE Phase 2
Once an IKE SA is established successfully in phase 1, the two IPSec endpoints will use it
to negotiate IPsec SAs in phase 2. The IPSec SAs are used to secure the user data to be
transmitted through the IPSec tunnel.
During IKE Phase 2, the two IPSec endpoints also exchange security proposals to
determine which security parameters to be used in the IPSec SAs. A phase 2 proposal
consists of one or two IPSec security protocols (either ESP or AH, or both), the encryption
and/or authentication algorithms used with the selected security protocol, and a
Diffie-Hellman if Perfect Forward Secrecy (PFS) is desired. Note that the UTT VPN
gateway doesn’t support PFS at present.
IKE phase 2 has one mode, which is called
Quick Mode
. Quick mode uses three
messages to establish IPSec SAs.
In the Web UI, it allows you to configure up to four phase 2 proposals. You can go to the
VPN > IPSec >
IPSec Settings
page to configure
P2 Encrypt/Auth Algorithms 1
, and then click the
Advanced
Options
hyperlink to configure
Encrypt/Auth Algorithms 2
~
Encrypt/Auth Algorithms 4 (Phase 2)
(section 6.1.2.2).
9.5.1.5 Maintain Security Associations (SAs)
After the SAs have been established, the two IPSec endpoints should maintain the SAs to
ensure that the SAs are secure and available. IPSec provides the following methods to
maintain and detect SAs.
1. SA Lifetime
During IKE and IPSec SAs negotiation and creation, the two IPSec endpoints also