©2015 Cradlepoint. All Rights Reserved.
|
+1.855.813.3385
|
cradlepoint.com
46
User Manual
/
AER3100/AER3150
Add/Edit Tunnel – IKE Phase 1
IKE security has two phases, phase 1 and phase 2. You have the ability to distinctly configure each phase, but
the default settings will be sufficient for most users.
To set up a tunnel with a remote site, you need to match your tunnel’s IKE negotiation parameters with the
remote site. By selecting several encryption, hash, and DH group options, you improve your chances for a
successful tunnel negotiation. For greatest compatibility, select all options; for greatest security, select only
the most secure options that your devices support.
Exchange Mode
: The IKE protocol has two modes
of negotiating phase 1 –
Main
(also called Identity
Protection) and
Aggressive
.
•
In
Main
mode, IKE separates the key information
from the identities, allowing for the identities
of peers to be secure at the expense of extra
packet exchanges.
•
In
Aggressive
mode, IKE tries to combine as much
information into fewer packets while maintaining
security. Aggressive mode is slightly faster but
less secure.
Because it has better security,
Main
mode is
recommended for most users.
Key Lifetime
: The lifetime of the generated keys of
phase 1 of the IPsec negotiation from IKE. After the time has expired, IKE will renegotiate a new set of phase 1
keys.
Encryption, Hash, and DH Groups
Each IKE exchange uses one encryption algorithm, one hash function, and one DH group to make a secure
exchange.
Encryption
: Used to encrypt messages sent and received by IPsec.
•
AES 128
•
AES 256
•
DES
•
3DES
Hash
: Used to compare, authenticate, and validate that data across the VPN arrives in its intended form and to
derive keys used by IPSec.
•
MD5
•
SHA1
•
SHA2 256
•
SHA2 384
•
SHA2 512
Note that some Encryption/Hash combinations (e.g., 3DES with SHA2 384/512) are computationally expensive,
impacting WAN performance. AES is as strong an encryption and performs much better than 3DES.
DH Groups
: The DH (Diffie-Hellman) Group is a property of IKE and is used to determine the length of prime
numbers associated with key generation. The strength of the key generated is partially determined by the
strength of the DH Group. Group 5, for instance, has greater strength than Group 2.
•
Group 1: 768-bit key