RAM-6021 Wired Router
56
Network Tab
Negotiation
Mode:
To
use
Aggressive
ISAKMP
Negotiations,
select
Yes
from
the
list
provided
or
No
to
prevent
it’s
use.
Dead
Peer
Detection
Action:
This
feature
can
help
detect
when
a
remote
end
‐
point
is
no
longer
communicating
prop
‐
erly.
Once
an
error
is
detected,
the
“hold”
state
will
only
renegotiate
the
tunnel
after
new
traffic
destined
for
the
tun
‐
nel
is
detected.
The
“restart”
state
will
attempt
to
immediately
re
‐
establish
the
connection
to
the
concentrator.
For
this
reason,
“restart”
may
use
more
bandwidth
and
may
not
be
the
ideal
choice
for
a
limited
data
plan.
However,
if
a
host
at
the
central
site
needs
to
initiate
connections
down
to
a
local
device
through
the
tunnel,
“restart”
may
be
nec
‐
essary
so
that
the
tunnel
is
always
up
and
waiting
for
new
data
from
the
concentrator.
Use
Perfect
Forward
Secrecy:
Specifies
whether
or
not
the
tunnel
will
use
Perfect
Forward
Secrecy
when
negotiation
cryptography
parameters
with
the
remote
device.
Note:
This
parameter
must
be
set
the
same
on
the
devices
on
both
sides
of
the
tunnel
in
order
for
a
Security
Association
(SA)
to
be
established.
This
is
one
of
the
first
things
that
should
be
checked
when
tunnel
negotiation
difficulties
are
encountered.
•
Click
on
the
NEXT
button
and
the
following
Encryption
Settings
dialog
window
will
appear:
Phase
1
Encryption:
Select
the
type
of
encryption
needed
for
phase
1
(IKE).
Phase
1
Authentication:
Select
the
type
of
authentication
needed
for
phase
1
(IKE).
Phase
1
DH
Group:
Select
the
DH
Group
needed
for
phase
1
(IKE)
by
choosing
one
of
the
values
from
the
drop
‐
down
list
provided.
This
option
selects
the
encryption
level
of
the
Diffie
‐
Hellman
keys
and
these
are
Group
1
(768
bits),
Group
2
(1024
bits),
Group
5
(1536
bits)
or
Group
14
(2048
bits).
Longer
keys
imply
better
security
but
at
a
cost
of
lon
‐
ger
negotiation/set
‐
up
time
during
the
initial
connection
establishment.
These
settings
must
match
on
both
ends
of
the
connection.
A
value
of
None
means
that
no
DH
Group
will
be
selected
for
this
end
of
the
tunnel
and
it
will
adopt
the
settings
of
its
peer
during
connection
initiation.
Phase
1
ISAKMP
Time
(minutes):
Select
how
long,
in
minutes,
the
keying
channel
of
a
connection
(ISAKMP
SA)
should
last
before
being
renegotiated.
Pre
‐
Shared
Key
(Required):
Specify
the
key
to
be
exchanged
for
encryption
negotiation
during
phase
(IKE).
Key
must
not
contain
a
double
‐
quote
character.
Note:
The
Pre
‐
Shared
Key
must
match
on
both
ends
of
the
tunnel
in
order
to
work.