VPN configuration
67
Configuration Guide
Interface Name
Select the name of the interface for which you want to apply the policy.
Policy Status
Select the status of the IPsec policy. Select ACTIVE to make the policy
active. The policy becomes active after you press Apply.
IPSec Gateway IP Address
Specifies the Security remote endpoint address. All packets are secure up
to this destination.
Traffic Selector table
Local Address
Type the Source IP address of the outbound traffic.
Local Address Mask
Type the Network mask of the outbound traffic.
Remote Address
Type the Destination IP address of the outbound traffic.
Remote Address Mask
Type the Destination mask of the outbound traffic.
Protocol
Select the traffic protocol for the source or destination address. Select one
of the following options:
•
Any
•
TCP
•
UDP
•
ICMPv4
•
AH
•
ESP
When you select a protocol and apply the IPSec policy, the policy is
applied on the selected protocol packets only. For example, if you select
ICMPv4, when you ping from one host to another, only ICMP packets are
encrypted or authenticated.
IKE Phase 1 Proposal table
IPSec Encryption
Select the IPSec Encryption. Select one of the following options:
•
Data Encryption Standard (DES) – is a standard for encrypting data
that uses a 64 bit key to encrypt data, but only 56 bits are usable. This
standard is considered inadequate for data protection as this standard
do not match the speed of computer.
•
Triple Data Encryption Standard (3DES) – processes each block of
data using a different key each time resulting in a significantly more
secure message.
•
Advanced Encryption Standard (AES128, AES192, AES256) – has a
fixed block size of 128 bits and a key size of 128, 192, or 256 bits. Due
to the fixed block size of 128 bits, AES operates on a 4x4 array of
bytes.
Select DES if you prefer Network speed. Select 3-DES if your choice is
Network security.
IPSec Authentication
Select the preferred authentication method.
Select HMAC-MAC5, the message authentication code is calculated using
the MD5 cryptographic hash function. This cryptographic hash function
has some additional security properties with a 128-bit hash value, which is
commonly used to check the integrity of files.
Select HMAC-SHA1, the message authentication code is calculated using
the SHA1 algorithm. This cryptographic hash function computes a
condensed digital representation to a high degree of probability.
Variable
Value
Содержание BSG12aw 1.0
Страница 14: ...14 Introduction NN47928 500 NN47928 500 ...
Страница 22: ...22 WAN configuration NN47928 500 NN47928 500 ...
Страница 54: ...54 SIP configuration NN47928 500 NN47928 500 ...
Страница 80: ...80 QoS configuration NN47928 500 NN47928 500 ...
Страница 82: ...82 Advanced configuration NN47928 500 NN47928 500 ...
Страница 110: ...110 LAN advanced configuration NN47928 500 NN47928 500 ...
Страница 144: ...144 IP routing advanced configuration NN47928 500 NN47928 500 ...
Страница 152: ...152 DHCP advanced configuration NN47928 500 NN47928 500 ...
Страница 164: ...164 QoS advanced configuration NN47928 500 NN47928 500 ...
Страница 176: ...176 VPN advanced configuration NN47928 500 NN47928 500 ...
Страница 200: ...200 Port management advanced configuration NN47928 500 NN47928 500 ...