![Linksys RVL200 Скачать руководство пользователя страница 72](http://html1.mh-extra.com/html/linksys/rvl200/rvl200_user-manual_1924696072.webp)
59
Chapter 5: Setting Up and Configuring the Router
VPN Tab - Gateway to Gateway
4-Port SSL/IPSec VPN Router
Phase 2 Encryption. Phase 2 is used to create one or more IPSec SAs, which are then used to key IPSec sessions.
Select a method of encryption,
DES
or
3DES
. The encryption method determines the length of the key used to
encrypt or decrypt ESP packets. DES uses 56-bit encryption, and 3DES uses 168-bit encryption. Both ends of the
VPN tunnel must use the same Phase 2 Encryption setting.
Phase 2 Authentication. Select a method of authentication,
MD5
or
SHA
. The authentication method determines
how the ESP packets are validated. MD5 is a one-way hashing algorithm that produces a 128-bit digest. SHA is a
one-way hashing algorithm that produces a 160-bit digest. SHA is recommended because it is more secure. Both
ends of the VPN tunnel must use the same Phase 2 Authentication setting.
Phase 2 SA Life Time. Configure the length of time a VPN tunnel is active in Phase 2. The default is
3600
seconds.
Preshared Key. This specifies the pre-shared key used to authenticate the remote IKE peer. Enter a key of
keyboard and hexadecimal characters, e.g., My_@123 or 4d795f40313233. This field allows a maximum of
30 characters and/or hexadecimal values. Both ends of the VPN tunnel must use the same Preshared Key. It is
strongly recommended that you change the Preshared Key periodically to maximize VPN security.
Click the
Save Settings
button to save your changes, or click the
Cancel Changes
button to undo the changes.
Advanced
For most users, the settings on the VPN page should suffice; however, the Router provides advanced IPSec
settings for advanced users. Click the
Advanced
button to view the Advanced settings.
Aggressive Mode. There are two types of Phase 1 exchanges, Main Mode and Aggressive Mode.
Aggressive Mode requires half of the main mode messages to be exchanged in Phase 1 of the SA exchange. If
network security is preferred, leave the
Aggressive Mode
checkbox unchecked. If network speed is preferred,
select
Aggressive Mode
. If you select one of the Dynamic IP types for the Remote Security Gateway Type
setting, then Main Mode will be unavailable, so Aggressive Mode will be used.
Dead Peer Detection (DPD). When DPD is enabled, the Router will send periodic HELLO/ACK messages to
check the status of the VPN tunnel (this feature can be used only when both peers or VPN devices of the VPN
tunnel use the DPD mechanism). Once a dead peer has been detected, the Router will disconnect the tunnel
so the connection can be re-established. Specify the interval between HELLO/ACK messages (how often you
want the messages to be sent). DPD is enabled by default, and the default interval is
10
seconds.
NAT Traversal. This is enabled by default. Both the IPSec initiator and responder must support the mechanism
for detecting the NAT router in the path and changing to a new port, as defined in RFC 3947.
Click the
Save Settings
button to save your changes, or click the
Cancel Changes
button to undo the changes.
Содержание RVL200
Страница 170: ...157 Appendix Q Regulatory Information 4 Port SSL IPSec VPN Router ...
Страница 171: ...158 Appendix Q Regulatory Information 4 Port SSL IPSec VPN Router ...
Страница 172: ...159 Appendix Q Regulatory Information 4 Port SSL IPSec VPN Router ...
Страница 173: ...160 Appendix Q Regulatory Information 4 Port SSL IPSec VPN Router For more information visit www linksys com ...