Configuring a VPN Security Association
131
alphanumeric characters with a minimum length of 4 characters and a
maximum of 128 characters. Precautions should be taken when
delivering/exchanging this shared secret to assure that a third party
cannot compromise the security of a VPN tunnel.
Enter your chosen shared secret in the
Shared Secret
field.
This setting is not available if the
IPSec Keying Mode
is set to
Manual Key
.
Encryption Key
The
Encryption Key
is a hexadecimal number that is used to encrypt the
VPN tunnel when using
Manual Keying
. The length of the
Encryption Key
is determined by the method of encryption that is used.
■
For 56 bit DES the number must be 16 hexadecimal digits long.
■
For 56 bit ARCFour the number must be 16 hexadecimal digits long.
■
For 168 bit 3DES the number must be 48 hexadecimal digits long.
If the Encryption Key is less than the value stated above it will be rejected
by the Firewall. If it is longer than stated then the number will be
truncated and the stated number of digits used.
The
Encryption Key
is only used when
Manual Keying
is employed. This
field does not appear when using IKE as your
IPSec Keying Mode
.
Authentication Key
The
Authentication Key
is a hexadecimal number that is used to
authenticate the users of the VPN tunnel when using
Manual Keying
. The
length of the
Authentication Key
is always 32 digits.
If the
Authentication Key
is less than the value stated above it will be
rejected by the Firewall. If it is longer than stated then the number will be
truncated.
The
Authentication Key
is only used when
Manual Keying
is employed.
This field does not appear when using IKE as your
IPSec Keying Mode
.
Setting the
Destination Network
for the VPN Tunnel
If you are specifying a Security Association for use with VPN clients in
addition to the GroupVPN you must specify the Destination Network for
the link.
DUA1611-0AAA02.book Page 131 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...