![INSYS MoRoS ADSL 2.1 PRO Скачать руководство пользователя страница 70](http://html1.mh-extra.com/html/insys/moros-adsl-2-1-pro/moros-adsl-2-1-pro_manual_2070346070.webp)
Functions
MoRoS ADSL 2.1 PRO
In order to specify the authentication mode, select it in the drop-down
list "Authentication mode". The main mode is more secure, because all
authentication data is transmitted encrypted. The aggressive mode is
quicker, because it does not use encryption and the authentication is
preformed via a passphrase.
In order to define encryption and hash algorithms as well as the Diffie-
Hellman group for the IKE key exchange, select these from the drop-
down lists "IKE algorithms".
In order to define encryption and hash algorithms for the IPsec
connection, select these from the drop-down lists "IPsec algorithms".
In order to enter the maximum number of connection attempts, which
must be exceeded that a remote terminal is considered as not available,
enter this into the field "Maximum retries". A value of "0" means an
infinite number of attempts here.
In order to mask the received packets with the local IP address of the
MoRoS ADSL 2.1 PRO, check the checkbox "Mask packets through
tunnel". The recipient of the packets will see the local IP address of the
MoRoS ADSL 2.1 PRO as sender than, not the address of the original
sender from the local net of the remote terminal.
In order to configure the dead peer detection, enter the interval, which is
used to send requests to the remote terminal, in seconds into the field
"Dead peer detection interval" and the maximum time, in which these
requests must be replied, in seconds into the field "Dead peer detection
timeout". Select the behaviour for a connection, which is considered as
interrupted, in the drop-down list "Action on dead peer". If you select
"restart" (default setting) here, the connection will be restarted, for
"clear", it will be terminated, and for "hold", it will be held.
In order to enable perfect forward secrecy, check the checkbox "Activate
perfect forward secrecy". This can prevent that the next key can be
discovered more quickly from a hacked encryption. Both remote
terminals must have matching settings to be able to establish the
connection.
In order to configure the interval for the key renegotiation, enter the
value in seconds into the field "Interval for renegotiation of data channel
key". The minimum value is 3600 seconds (1 hour). The regular renewal
of the used keys can ensure the security of the IPsec connection for a
longer period.
in order to send an additional ping via ICMP protocol to an IP address,
enter this address, which must be located in the local subnet of the
remote terminal, into the field "Additional ICMP ping to". If the ping is
not successful, a possibly existing tunnel will be terminated, and a new
tunnel will be established. The ping interval is 15 minutes.
70