4. CONFIGURATION
Continued from previous page
Item
Description
IKE Algorithm
Specifies the means by which the router selects the algorithm:
•
auto
– The encryption and hash algorithm are selected au-
tomatically.
•
manual
– The encryption and hash algorithm are defined
by the user.
IKE Encryption
Encryption algorithm – 3DES, AES128, AES192, AES256.
IKE Hash
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512.
IKE DH Group
Specifies the Diffie-Hellman groups which determine the strength
of the key used in the key exchange process. Higher group num-
bers are more secure, but require more time to compute the key.
ESP Algorithm
Specifies the means by which the router selects the algorithm:
•
auto
– The encryption and hash algorithm are selected au-
tomatically.
•
manual
– The encryption and hash algorithm are defined
by the user.
ESP Encryption
Encryption algorithm – DES, 3DES, AES128, AES192, AES256.
ESP Hash
Hash algorithm – MD5, SHA1, SHA256, SHA384 or SHA512.
PFS
Enables/disables the Perfect Forward Secrecy function. The
function ensures that derived session keys are not compromised
if one of the private keys is compromised in the future.
PFS DH Group
Specifies the Diffie-Hellman group number (see
IKE DH Group
).
Key Lifetime
Lifetime key data part of tunnel. The minimum value of this pa-
rameter is 60 s. The maximum value is 86400 s.
IKE Lifetime
Lifetime key service part of tunnel. The minimum value of this
parameter is 60 s. The maximum value is 86400 s.
Rekey Margin
Specifies how long before a connection expires that the router
attempts to negotiate a replacement. Specify a maximum value
that is less than half of IKE and Key Lifetime parameters.
Rekey Fuzz
Percentage of time for the Rekey Margin extension.
DPD Delay
Time after which the IPsec tunnel functionality is tested.
DPD Timeout
The period during which device waits for a response.
Continued on next page
74
Содержание SmartMotion
Страница 1: ...Twin Cellular Module Router SmartMotion CONFIGURATION MANUAL ...
Страница 24: ...3 STATUS WiFi Scan output may look like this Figure 4 WiFi Scan 14 ...
Страница 27: ...3 STATUS Figure 5 Network Status 17 ...
Страница 38: ...4 CONFIGURATION Figure 15 Network Topology for Example 2 Figure 16 LAN Configuration for Example 2 28 ...
Страница 44: ...4 CONFIGURATION Figure 24 1st Mobile WAN Configuration 34 ...
Страница 62: ...4 CONFIGURATION Figure 31 WiFi Configuration 52 ...
Страница 86: ...4 CONFIGURATION Figure 46 IPsec Tunnels Configuration 76 ...
Страница 112: ...4 CONFIGURATION Figure 67 Example 2 USB port configuration 102 ...