38
value ranges from 300 seconds to 172,800 seconds.
Encapsulation protocol
There are two protocols can be selected: ESP and AH.
Local SPI
SPI is an important parameter during hashing. Local SPI will be included in the outbound packet
transmitted from WAN interface of local gateway. The value of local SPI should be set in hex
formatted.
Remote SPI
Remote SPI will be included in the inbound packet transmitted from WAN site of remote gateway. It
will be used to de-hash the coming packet and check its integrity. The value of remote SPI should be
set in hex formatted.
Encryption algorithm
There are three algorithms can be selected: AES, 3DES and DES (Some models only support 3DES
and DES). But when the encapsulation protocol is AH, encryption algorithm is unnecessarily set.
Encryption key
Encryption key is used by the encryption algorithm. Its length is 8 bytes if encryption algorithm is DES
or 24 bytes if 3DES. The key value should be set in hex formatted.
Authentication algorithm
There are two algorithms can be selected: SHA1 and MD5. But “none” also can be selected here if no
hashing operation is necessary.
Authentication key
Authentication key is used by the authentication algorithm. Its length is 16 bytes if authentication
algorithm is MD5 or 20 bytes if SHA1. Certainly, its length will be 0 if no authentication algorithm is
chosen. The key value should be set in hex formatted.
4.6.6 Miscellaneous Items
Remote Administrator Host/Port
In general, only Intranet user can browse the built-in web pages to perform administration task. But this
feature enables you to perform administration task from remote host. If this feature is enabled, only the
specified IP address can perform remote administration. If the specified IP address is 0.0.0.0, any host
can connect to this product to perform administration task. You can use subnet mask bits "/nn" notation
to specified a group of trusted IP addresses. For example, "10.1.2.0/24".
Содержание FBR-1411TX
Страница 1: ...1 LevelOne FBR 1411TX 1W 4L High Performance Broadband Router w VPN DMZ port User s Manual...
Страница 46: ...46 After configure Rule 1 Schedule Enable Selected if you want to Enable the Scheduler Edit...
Страница 48: ...48 Exanple2 Packet Filter Apply Rule 1 ftp time everyday 14 10 to 16 20 4 8 Toolbox Chapter Home...
Страница 56: ...56...