![InHand InGateway502 Скачать руководство пользователя страница 91](http://html1.mh-extra.com/html/inhand/ingateway502/ingateway502_user-manual_2061305091.webp)
87
•
SHA1: generates a 160-bit message digest for a message of a length less than
128 bits.
•
SHA2-256: generates a 256-bit message digest.
•
SHA2-384: generates a 384-bit message digest.
•
SHA2-512: generates a 512-bit message digest.
o
Diffie-Hellman Group: specifies the Diffie-Hellman algorithm, an open key
algorithm. Two parties calculate a shared key based on the data exchanged
between them, without transmitting the key to each other. To encrypt data sent
to each other, the two parties must have a shared key. The essence of Internet
Key Exchange (IKE) is that the communication parties never transmit the key
over an insecure network. Instead, they exchange a series of data to calculate
a shared key. Other parties (such as hackers) cannot calculate the key even if
they intercept all the data exchanged for key calculation.
o
Lifetime: specifies the lifetime of the IKE security association (SA). The two
parties negotiate another SA to replace the old one before the lifetime expires.
•
IKEv2 Policy
o
ID: specifies the ID of an IKEv2 policy.
o
Encryption: specifies the algorithm used to encrypt plain text. Options are
3DES, DES, AES128, AES192, and AES256.
•
3DES: uses three 64-bit DES keys to encrypt plain text.
•
DES: uses a 64-bit key to encrypt a 64-bit plain-text block.
•
AES: uses a 128-bit, 192-bit, or 256-bit key to encrypt plain text.
o
Integrity: specifies the algorithm used to check data integrity. Options are MD5,
SHA1, SHA2-256, SHA2-384, and SHA2-512.
•
MD5: generates a 128-bit message digest for a message of any length.
•
SHA1: generates a 160-bit message digest for a message of a length less than
128 bits.
•
SHA2-256: generates a 256-bit message digest.
•
SHA2-384: generates a 384-bit message digest.
•
SHA2-512: generates a 512-bit message digest.
o
Diffie-Hellman Group: specifies the Diffie-Hellman algorithm, an open key
algorithm. Two parties calculate a shared key based on the data
exchanged between them, without transmitting the key to each other. To
encrypt data sent to each other, the two parties must have a shared key.
The essence of IKE is that the communication parties never transmit the
key over an insecure network. Instead, they exchange a series of data to
Содержание InGateway502
Страница 1: ......
Страница 8: ...4 2 2 Structure and Dimensions Figure 2 2 1 Wall Mounting A Figure 2 3 2 Wall Mounting B...
Страница 22: ...18 Figure 3 8 2 4 Pulse output Note This section is only applicable to IG500 with industrial interfaces...
Страница 48: ...44 The following figure shows the configuration of an extended access control policy...
Страница 49: ...45 The following figure shows the configuration of an access control list...
Страница 58: ...54 Once enabled the App automatically runs and will run every time the IG502 is started...
Страница 62: ...58 After the update is completed as shown below...
Страница 66: ...62 Pulse counting The starting value is 0 After power down the value counted by the power down is retained...
Страница 67: ...63 Digital output Pulse output According to the frequency of 5000 Hz the duty cycle is 50 for the pulse output...
Страница 71: ...67...
Страница 72: ...68 After the configuration is completed you can obtain DI0 Counter Value 4 7 System 4 7 1 System Time...