EBW-E100
Functions
65
In order to define encryption and hash algorithms as well as the Diffie-
Hellman group for the IKE key exchange, select these from the drop-
down lists "IKE algorithms".
In order to define encryption and hash algorithms for the IPsec
connection, select these from the drop-down lists "IPsec algorithms".
In order to enter the maximum number of connection attempts, which
must be exceeded that a remote terminal is considered as not available,
enter this into the field "Maximum retries". A value of "0" means an
infinite number of attempts here.
In order to mask the received packets with the local IP address of the
EBW-E100, check the checkbox "Mask packets through tunnel". The
recipient of the packets will see the local IP address of the EBW-E100 as
sender than, not the address of the original sender from the local net of
the remote terminal.
In order to configure the dead peer detection, enter the interval, which is
used to send requests to the remote terminal, in seconds into the field
"Dead peer detection interval" and the maximum time, in which these
requests must be replied, in seconds into the field "Dead peer detection
timeout". Select the behaviour for a connection, which is considered as
interrupted, in the drop-down list "Action on dead peer". If you select
"restart" (default setting) here, the connection will be restarted, for
"clear", it will be terminated, and for "hold", it will be held.
In order to enable perfect forward secrecy, check the checkbox "Activate
perfect forward secrecy". This can prevent that the next key can be
discovered more quickly from a hacked encryption. Both remote
terminals must have matching settings to be able to establish the
connection.
In order to configure the interval for the IKE SA key renegotiation, enter
the value in seconds into the field "Interval for renegotiation of IKE SA".
The minimum value is 3600 seconds (1 hour). The regular renewal of the
used keys can ensure the security of the IPsec connection for a longer
period.
In order to configure the interval for the IPsec SA key renegotiation,
enter the value in seconds into the field "Interval for renegotiation of
IPsec SA". The minimum value is 3600 seconds (1 hour). The regular
renewal of the used keys can ensure the security of the IPsec connection
for a longer period.
In order to send an additional ping via ICMP protocol to an IP address,
enter this address, which must be located in the local subnet of the
remote terminal, into the field "Additional ICMP ping to". If the ping is
not successful, a possibly existing tunnel will be terminated, and a new
tunnel will be established. The ping interval is 15 minutes. An additional
second IP address as ping target can be specified behind the first
separated by a "#".