Proroute
GEM
2M
4G
Router
GEM-2M series User Manual
90
There are 4 IKE proposals can be defined by you and used in IKE phase of
negotiation between two VPN peers.
1.
Encryption:
There are six algorithms can be selected: DES, 3DES, AES-auto,
AES-128, AES-192, and AES-256.
2.
Authentication:
There are
five
algorithms can be selected: None, MD5, SHA1,
SHA2-256 and SHA2-512.
3.
DH Group:
There are
nine
groups can be selected: None, Group 1 (MODP768),
Group 2 (MODP1024), Group 5 (MODP1536) and Group14 ~ 18.
4.
Enable:
Check this box to enable the IKE Proposal during tunnel establishing.
3.2.3.2.9 IPSec
Phase
1.
Phase 2 Key Life Time
: The value of life time represents the life time of the key
which is dedicated at Phase 2 between two VPN peers.
3.2.3.2.10 IPSec Proposal Definition
There are 4 IPSec proposals can be defined by you and used in IPSec phase of
negotiation between two VPN peers.
1.
Encryption:
There are six algorithms can be selected: DES, 3DES, AES-auto,
AES-128, AES-192, and AES-256.
2.
Authentication:
There are five algorithms can be selected: None, MD5, SHA1,
SHA2-256 and SHA2-512.
3.
PFS Group:
There are nine groups can be selected: None, Group 1 (MODP768),