![InHand InGateway502 Скачать руководство пользователя страница 92](http://html1.mh-extra.com/html/inhand/ingateway502/ingateway502_user-manual_2061305092.webp)
88
calculate a shared key. Other parties (such as hackers) cannot calculate
the key even if they intercept all the data exchanged for key calculation.
o
Lifetime: specifies the lifetime of the IKE SA. The two parties negotiate another
SA to replace the old one before the lifetime expires.
•
IPsec Policy
o
Name: specifies the name of the IPsec policy. This parameter cannot be changed
after the IPsec policy is configured successfully.
o
Encapsulation: specifies the encapsulation protocol used for IP packets. The
Authentication Header (AH) protocol defines an authentication method to
authenticate data sources and ensure data integrity. The Encapsulating
Security Payload (ESP) protocol defines encryption and authentication
(optional) methods to ensure data reliability.
•
AH: provides data source authentication, data integrity check, and packet anti-
replay. The sender uses a hash algorithm to calculate a digest field for an IP
packet based on the fixed fields in the IP header and the IP payload. The
receiver calculates the digest for the received IP packet and compares it with
the digest field carried in the packet to determine whether the packet has been
tampered with during transmission on the network.
•
ESP: provides all functions of the AH protocol and encrypts
payload of IP packets. The ESP protocol can protect data in IP
headers of IP packets.
o
Authentication: specifies the algorithm used for authentication. Options are MD5,
SHA1, SHA2-256, SHA2-384, and SHA2-512.
•
MD5: generates a 128-bit message digest for a message of any length.
•
SHA1: generates a 160-bit message digest for a message of a length less than
128 bits.
•
SHA2-256: generates a 256-bit message digest.
•
SHA2-384: generates a 384-bit message digest.
•
SHA2-512: generates a 512-bit message digest.
o
IPsec Mode: specifies the IPsec encapsulation mode.
•
Tunnel Mode: adds an IPsec header (AH or ESP) outside the original IP
header and adds a new IP header at the outermost layer. Then, the original IP
packet is protected by IPsec as a part of payload. The tunnel mode is generally
used between two security gateways. The packets encrypted by one security
gateway can only be decrypted by the peer security gateway.
Содержание InGateway502
Страница 1: ......
Страница 8: ...4 2 2 Structure and Dimensions Figure 2 2 1 Wall Mounting A Figure 2 3 2 Wall Mounting B...
Страница 22: ...18 Figure 3 8 2 4 Pulse output Note This section is only applicable to IG500 with industrial interfaces...
Страница 48: ...44 The following figure shows the configuration of an extended access control policy...
Страница 49: ...45 The following figure shows the configuration of an access control list...
Страница 58: ...54 Once enabled the App automatically runs and will run every time the IG502 is started...
Страница 62: ...58 After the update is completed as shown below...
Страница 66: ...62 Pulse counting The starting value is 0 After power down the value counted by the power down is retained...
Страница 67: ...63 Digital output Pulse output According to the frequency of 5000 Hz the duty cycle is 50 for the pulse output...
Страница 71: ...67...
Страница 72: ...68 After the configuration is completed you can obtain DI0 Counter Value 4 7 System 4 7 1 System Time...