User Manual of WNAP-7350
-57-
Group 2
1024 bits MODP group
Group 3
EC2N group on GP(2^155)
Group 4
EC2N group on GP(2^185)
Group 5
1536 bits MODP group
IPSec Authentication
The AP supports
SHA1
&
MD5
authentication algorithms.
IPSec Encryption
The AP supports
DES
,
3DES
,
AES
,
Blowfish
,
Twofish
,
Camellia
Encryption methods.
DES - 56-bit DES-CBC
encryption algorithm
3DES - 168-bit DES
encryption algorithm
AES - 128, 192 and 256-bit key AES-CBC
encryption algorithm
Blowfish
- added since v4.5
Twofish
- added since v4.5
Camellia - 128, 192 and 256-bit key
Camellia encryption algorithm
added since v4.5
SA connection Life
Time
This value describes the timeframe in hours for which the IKE SA is valid
and when the next rekeying should take place.
IKE Key Tries
The field is used to specify the retry times of IKE Key.
Local IP Address
This field is used to configure the IP address of the Untangle server on
the network configured in the Local Network field.
Peer IP Address
This field should contain the public IP address of the host to which the
IPSec VPN will be connected.
Local Subnet
This field is used to configure the local network that will be reachable
from hosts on the other side of the IPSec VPN.
Peer Subnet
This field is used to configure the remote network that will be reachable
from hosts on the local side of the IPSec VPN.
Local Gateway
This field is used to configure the Gateway of the Untangle server on the
network configured in the Local Network field.
Peer Gateway
This field should contain the public Gateway of the host to which the
IPSec VPN will be connected.
IPSec Tunnel Name
This field should contain a short name or description.
IPSec Secret Key
This field should contain the shared secret or
PSK (pre-shared key)
that
is used to authenticate the connection, and must be the same on both
sides of the tunnel for the connection to be successful. Because the PSK
is actually used as the encryption key for the session, using long strings
of a random nature will provide the highest level of security.
IPSec Key Life time
Lifetime settings determine when a new key is generated. Any time a key
lifetime is reached, the associated SA is also renegotiated. The process
Содержание WNAP-7350
Страница 1: ......