Vigor3100 Series User’s Guide
62
Mutual Authentication (PAP)
The Mutual Authentication function is mainly used to
communicate with other routers or clients who need
bi-directional authentication in order to provide stronger
security, for example, Cisco routers. So you should enable this
function when your peer router requires mutual authentication.
You should further specify the
User Name
and
Password
of
the mutual authentication peer.
Start IP Address
Enter a start IP address for the dial-in PPP connection. You
should choose an IP address from the local private network.
For example, if the local private network is
192.168.1.0/255.255.255.0, you could choose 192.168.1.202 to
be the Start IP Address.
3
3
.
.
6
6
.
.
3
3
I
I
P
P
S
S
e
e
c
c
G
G
e
e
n
n
e
e
r
r
a
a
l
l
S
S
e
e
t
t
u
u
p
p
In
IPSec General Setup,
there are two major parts of configuration.
There are two phases of IKE/IPSec.
¾
Phase 1: negotiation of IKE parameters including encryption, hash, Diffie-Hellman
parameter values, and lifetime to protect the following IKE exchange, authentication of
both peers using either a Pre-Shared Key or Digital Signature (x.509). The peer that
starts the negotiation proposes all its policies to the remote peer and then remote peer
tries to find a highest-priority match with its policies. Eventually to set up a secure tunnel
for IKE Phase 2.
¾
Phase 2: negotiation IPSec security methods including Authentication Header (AH)
and/or Encapsulating Security Payload (ESP) for the following IKE exchange and
mutual examination of the secure tunnel establishment.
Authentication Header (AH) provides data authentication and integrity for IP packets passed
between VPN peers. This is achieved by a keyed one-way hash function to the packet to create
a message digest. This digest will be put in the AH and transmitted along with packets. On the
receiving side, the peer will perform the same one-way hash on the packet and compare the
value with the one in the AH it receives.
Encapsulating Security Payload (ESP) is a security protocol that provides data confidentiality
and protection with optional authentication and replay detection service. Vigor supports IPSec
used ESP to encrypt the data payload. There are two encryption methods in IPSec: Transport
and Tunnel. Transport mode encrypts only the data portion, a.k.a. payload, of each packet, but
not the header. Transport mode is used in L2TP over IP Sec. The more secure Tunnel mode
encrypts both the header and the payload. Tunnel mode is used in IPSec. ESP can be used
alone or in conjunction with AH.
Содержание Vigor 3100 Series
Страница 2: ...Vigor3100 Series User s Guide ii...
Страница 6: ......
Страница 20: ...Vigor3100 Series User s Guide 14...
Страница 114: ...Vigor3100 Series User s Guide 108...
Страница 122: ...Vigor3100 Series User s Guide 116...