217
eir F1000 Modem User
’s Guide
Chapter 18 VPN
Table 94
Security > IPSec VPN: Add/Edit
LABEL
DESCRIPTION
Perfect Forward
Secrecy (PFS)
Select whether or not you want to enable Perfect Forward Secrecy (PFS)
PFS changes the root key that is used to generate encryption keys for each IPSec SA. The
longer the key, the more secure the encryption, but also the longer it takes to encrypt and
decrypt information. Both routers must use the same DH key group. Choices are:
None
- do not use any random number.
768bit(DH Group1)
- use a 768-bit random number
1024bit(DH Group2)
- use a 1024-bit random number
1536bit(DH Group5)
- use a 1536-bit random number
2048bit(DH Group14)
- use a 2048-bit random number
3072bit(DH Group15)
- use a 3072-bit random number
4096bit(DH Group16)
- use a 4096-bit random number
Key Life Time
Define the length of time before an IPSec SA automatically renegotiates in this field.
A short SA Life Time increases security by forcing the two VPN gateways to update the
encryption and authentication keys. However, every time the VPN tunnel renegotiates, all
users accessing remote resources are temporarily disconnected.
The following fields are available if you select Manual in the Key Exchange Method field.
Encryption
Algorithm
Select which key size and encryption algorithm to use in the IKE SA. Choices are:
DES
- a 56-bit key with the DES encryption algorithm
3DES
- a 168-bit key with the DES encryption algorithm
EPS_NULL
- no encryption key or algorithm
Encryption
Key
This field is applicable when you select an Encryption Algorithm.
Enter the encryption key, which depends on the encryption algorithm.
DES
- type a unique key 16 hexadecimal characters long
3DES
- type a unique key 48 hexadecimal characters long
Authentication
Algorithm
Select which hash algorithm to use to authenticate packet data. Choices are MD5, SHA1.
SHA is generally considered stronger than MD5, but it is also slower.
Authentication
Key
Enter the authentication key, which depends on the authentication algorithm.
MD5
- type a unique key 32 hexadecimal characters long
SHA1
- type a unique key 40 hexadecimal characters long
SPI
Type a unique SPI (Security Parameter Index) in hexadecimal characters.
The SPI is used to identify the Device during authentication.
The Device and remote IPSec router must use the same SPI.
OK
Click
OK
to save your changes.
Cancel
Click
Cancel
to restore your previously saved settings.
Summary of Contents for eir F1000
Page 4: ...4 eir F1000 Modem User s Guide Contents Overview Diagnostic 273 Troubleshooting 279...
Page 14: ...14 eir F1000 Modem User s Guide Table of Contents...
Page 15: ...PART I User s Guide 15...
Page 16: ...16...
Page 27: ...27 eir F1000 Modem User s Guide Chapter 2 The Web Configurator Figure 10 Connection Status...
Page 33: ...PART II Technical Reference 33...
Page 34: ...34...
Page 68: ...68 eir F1000 Modem User s Guide Chapter 4 Broadband...
Page 134: ...134 eir F1000 Modem User s Guide Chapter 7 Routing...
Page 170: ...170 eir F1000 Modem User s Guide Chapter 9 Network Address Translation NAT...
Page 180: ...Chapter 11 Interface Group 180 eir F1000 Modem User s Guide...
Page 186: ...186 eir F1000 Modem User s Guide Chapter 12 USB Service...
Page 200: ...200 eir F1000 Modem User s Guide Chapter 15 Parental Control...
Page 210: ...210 eir F1000 Modem User s Guide Chapter 17 Certificates...
Page 228: ...Chapter 19 Log 228 eir F1000 Modem User s Guide...
Page 248: ...248 eir F1000 Modem User s Guide Chapter 27 User Account...
Page 252: ...Chapter 28 Remote Management 252 eir F1000 Modem User s Guide...
Page 254: ...254 eir F1000 Modem User s Guide Chapter 29 TR 064...
Page 260: ...Chapter 31 Time Settings 260 eir F1000 Modem User s Guide...
Page 266: ...Chapter 33 Log Setting 266 eir F1000 Modem User s Guide...
Page 272: ...Chapter 35 Configuration 272 eir F1000 Modem User s Guide...
Page 278: ...Chapter 36 Diagnostic 278 eir F1000 Modem User s Guide...
Page 324: ...324 eir F1000 Modem User s Guide Appendix C Pop up Windows JavaScripts and Java Permissions...
Page 338: ...338 eir F1000 Modem User s Guide Appendix D Wireless LANs...