156
Key Exchange Method: Displays key exchange method.
Pre-Shared Key: This is for the Internet Key Exchange (IKE) protocol, a string from 1 to 32
characters. Both sides should use the same key. IKE is used to establish a shared security policy
and authenticated keys for services (such as IPSec) that require a key. Before any IPSec traffic can
be passed, each router must be able to verify the identity of its peer. This can be done by manually
entering the pre-shared key into both sides (router or hosts).
Local ID Type and Remote ID Type: When the mode of phase 1 is aggressive, Local and Remote
peers can be identified by other IDs.
ID content: Enter ID content the name you want to identify when the Local and Remote Type are
Domain Name; Enter ID content IP address you want to identify when the Local and Remote Type
are IP addresses (IPv4 and IPv6 supported).
Phase 1
Mode: Select IKE mode from the drop-down menu: Main or Aggressive. This IKE provides
secured key generation and key management.
Encryption Algorithm: Select the encryption algorithm from the drop-down menu. There are
several options: 3DES and AES (128, 192 and 256). 3DES and AES are more powerful but
increase latency.
DES: Stands for Triple Data Encryption Standard, it uses 56 bits as an encryption method.
3DES: Stands for Triple Data Encryption Standard, it uses 168 (56*3) bits as an encryption
method.
AES: Stands for Advanced Encryption Standards, you can use 128, 192 or 256 bits as
encryption method.
Integrity Algorithm: Authentication establishes the integrity of the datagram and ensures it is not
tampered with in transmit. There are 2 options: Message Digest 5 (MD5) and Secure Hash
Algorithm (SHA1). SHA1 is more resistant to brute-force attacks than MD5. However, it is slower.
MD5: A one-way hashing algorithm that produces a 128−bit hash.
SHA1: A one-way hashing algorithm that produces a 160−bit hash.
DH Group: It is a public-key cryptography protocol that allows two parties to establish a shared
secret over an unsecured communication channel (i.e. over the Internet). MODP stands for Modular
Exponentiation Groups.
SA Lifetime: Specify the number of minutes that a Security Association (SA) will stay active before
new encryption and authentication key will be exchanged. Enter a value to issue an initial
connection request for a new VPN tunnel. Default is 480 minutes (28800 seconds). A short SA time
increases security by forcing the two parties to update the keys. However, every time when the VPN
tunnel re-negotiates, access through the tunnel will be temporarily disconnected.
Phase 2
Encryption Algorithm: Select the encryption algorithm from the drop-down menu. There are
several options: 3DES and AES (128, 192 and 256). 3DES and AES are more powerful but
increase latency.
Integrity Algorithm: Authentication establishes the integrity of the datagram and ensures it is not
tampered with in transmit. There are 2 options: Message Digest 5 (MD5) and Secure Hash
Algorithm (SHA1). SHA1 is more resistant to brute-force attacks than MD5. However, it is slower.
DH Group: It is a public-key cryptography protocol that allows two parties to establish a shared
secret over an unsecured communication channel (i.e. over the Internet). MODP stands for Modular
Exponentiation Groups.
Содержание BiPAC 8900X R3
Страница 20: ...15 3G LTE Router mode ...
Страница 64: ...59 3 Wait while the device is configured 4 Success ...
Страница 113: ...108 Accessing mechanism of Storage In your computer Click Start Run enter 192 168 1 254 ...
Страница 115: ...110 Access the folder public ...
Страница 118: ...113 Step 2 Click Add a Printer Step 3 Click Add a network wireless or Bluetooth printer ...
Страница 121: ...116 Step 8 Click Next and you are done You will now be able to see your printer on the Devices and Printers Page ...
Страница 123: ...118 Take Windows media player in Windows 7 accessing the DLNA server for example for usage of DLNA ...
Страница 129: ...124 Rule inactive ...
Страница 165: ...160 ...
Страница 168: ...163 ...
Страница 177: ...172 2 Click Connect to a workplace and press Next 3 Select Use my Internet connection VPN and press Next ...
Страница 178: ...173 4 Input Internet address and Destination name for this connection and press Next ...
Страница 179: ...174 5 Input the account user name and password and press Create ...
Страница 180: ...175 6 Connect to the server ...
Страница 182: ...177 ...
Страница 193: ...188 2 Click Connect to a workplace and press Next 3 Select Use my Internet connection VPN and press Next ...
Страница 194: ...189 4 Input Internet address and Destination name for this connection and press Next ...
Страница 195: ...190 5 Input the account user name and password and press Create ...
Страница 198: ...193 9 Go to Network connections enter username and password to connect L2TP_IPSec and check the connection status ...
Страница 207: ...202 3 Set the OpenVPN client s E mail address to receive trusted CA from server to establish a trusted OpenVPN tunnel ...
Страница 225: ...220 2 ipoe_eth0 with DDNS www hometest1 com using username password test test ...
Страница 236: ...231 Click Import Certificate button to import your certificate Enter the certificate name and insert the certificate ...
Страница 237: ...232 Click Apply to confirm your settings ...
Страница 243: ...238 HTTP Port The device equips user to change the embedded web server accessing port Default is 80 ...
Страница 245: ...240 Mobile Networks User can press Scan to discover available 3G 4G LTE mobile network ...
Страница 251: ...246 Example Ping www google com ...
Страница 252: ...247 Example trace www google com ...