The authentication method determines how the Encapsulating Security Payload Protocol
(ESP) header packets are validated. The MD5 is a one-way hashing algorithm that
produces a 128-bit digest. The SHA1 is a one-way hashing algorithm that produces a
160-bit digest. The SHA1 is recommended because it is more secure. Make sure that
both ends of the VPN tunnel use the same authentication method. Select an
authentication (
MD5, SHA1 or SHA2-256
).
Authentication
Amount of time an IKE SA is active in this phase (Range 120 to 86400, Default 28800).
SA Lifetime (Sec)
Pre-shared key to use to authenticate the remote IKE peer. You can enter up to 30
keyboard characters or hexadecimal values, such as My_@123 or 4d795f40313233.
Both ends of the VPN tunnel must use the same Pre-shared Key.
We recommend that you change the Pre-shared Key periodically to maximize VPN
security.
Pre-Shared Key
Phase 2 Options
Select a protocol from the drop-down list.
•
AH
: Select this for data integrity in situations where data is not secret but must
be authenticated.
•
ESP
: Select ESP for data encryption and enter the encryption.
Protocol Selection
Select an encryption (
3DES, AES-128, AES-192, or AES-256
) from the drop-down
list. Method determines the algorithm used to encrypt or decrypt ESP/ISAKMP packets.
Encryption
Select an authentication (
MD5, SHA1, or SHA2-256
).
Authentication
Amount of time a VPN tunnel (IPSec SA) is active in this phase. The default value for
Phase 2 is 3600 seconds.
SA Lifetime (Sec)
Provide a name for the new profile.
Save as a new profile
When Perfect Forward Secrecy (PFS) is enabled, IKE Phase 2 negotiation generates
new key material for IPSec traffic encryption and authentication. Perfect Forward
Secrecy is used to improve the security of communications transmitted across the
Internet using public key cryptography. Check the box to enable this feature, or uncheck
the box to disable this feature. This feature is recommended. Enter lifetime in seconds.
Perfect Forward Secrecy
(PFS)
Step 11
Click
Next
to see the summary of all configurations.
Step 12
Click
Submit
.
IPSec VPN
Internet Protocol Security (IPSec) is a set of protocols which sit on top of the Internet Protocol (IP) layer.
This allows for two or more hosts to communicate in a secure manner by authenticating and encrypting each
IP packet of data.
The most common use of the IPSec protocol is to provide a Virtual Private Networking (VPN) service. A
VPN is a virtual network that is built on top of existing physical networks. VPNs provide a secure
RV260x Administration Guide
91
VPN
IPSec VPN
Содержание RV260 series
Страница 8: ...RV260x Administration Guide viii Contents ...
Страница 18: ...RV260x Administration Guide 10 Getting Started User Interface ...
Страница 30: ...RV260x Administration Guide 22 Status and Statistics Captive Portal Status ...
Страница 38: ...RV260x Administration Guide 30 Administration Copy Save Configuration ...
Страница 54: ...RV260x Administration Guide 46 System Configuration Registering Devices ...
Страница 80: ...RV260x Administration Guide 72 Wireless Lobby Ambassador ...
Страница 84: ...RV260x Administration Guide 76 Routing IGMP Proxy ...
Страница 96: ...RV260x Administration Guide 88 Firewall DMZ Host ...
Страница 122: ...RV260x Administration Guide 114 QoS Switch Queuing ...
Страница 124: ...RV260x Administration Guide 116 Where To Go Where To Go From Here ...