30
Chapter 5: Configuring the Wireless-G Travel Router with SpeedBooster
The Security Tab - VPN
Wireless-G Travel Router with SpeedBooster
button, hexadecimal characters (series of letters and numbers) are displayed in the Inbound SPI and
Outbound SPI fields.
The
Status
field at the bottom of the screen will show when a tunnel is active.
To connect a VPN tunnel, click the
Connect
button. The
View Logs
button, when logging is enabled on the Log
screen of the Administration tab, will show you VPN activity on a separate screen. The VPN Log screen displays
successful connections, transmissions and receptions, and the types of encryption used. For more advanced VPN
options, click the
Advanced Setting
button to open the Advanced Setting screen.
When finished making your changes on this screen, click the
Save Settings
button to save these changes, or
click the
Cancel
Changes
button to undo your changes.
Advanced VPN Tunnel Setup
From the Advanced Settings screen you can adjust the settings for specific VPN tunnels.
Phase 1
. Phase 1 is used to create a security association (SA), often called the IKE SA. After Phase 1 is completed, Phase
2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions.
Operation Mode
. There are two modes: Main and Aggressive, and they exchange the same IKE payloads in different
sequences. Main mode is more common; however, some people prefer Aggressive mode because it is faster. Main mode
is for normal usage and includes more authentication requirements than Aggressive mode. Main mode is recommended
because it is more secure. No matter which mode is selected, the VPN Router will accept both Main and Aggressive
requests from the remote VPN device. If a user on one side of the tunnel is using a Unique Firewall Identifier, this should
be entered under the
Username
field.
Encryption
. Select the length of the key used to encrypt/decrypt ESP packets. There are two choices: DES and 3DES.
3DES is recommended because it is more secure.
Authentication
. Select the method used to authenticate ESP packets. There are two choices: MD5 and SHA. SHA is
recommended because it is more secure.
Group
. There are two Diffie-Hellman Groups to choose from: 768-bit and 1024-bit. Diffie-Hellman refers to a
cryptographic technique that uses public and private keys for encryption and decryption.
Key Lifetime
. In the Key Lifetime field, you may optionally select to have the key expire at the end of a time period of your
choosing. Enter the number of seconds you’d like the key to be used until a re-key negotiation between each endpoint is
completed.
Phase 2
Group
. There are two Diffie-Hellman Groups to choose from: 768-bit and 1024-bit. Diffie-Hellman refers to a
cryptographic technique that uses public and private keys for encryption and decryption.
Figure 5-28: Security Tab - VPN - Advanced VPN Tunnel
Setup