Robustel R3010 User Guide
RT_UG_R3010_v.1.0.2 8 Aug., 2018 60
Confidential
If click
VPN > IPsec > Tunnel > General Settings
, and choose
ESP
as protocol. The specific parameter configuration is
shown as below.
If choose
AH
as protocol, the window of SA Settings is displayed as below.
SA Settings
Item
Description
Default
Encrypt Algorithm
Select from “3DES”, “AES128” or “AES256” when you select “ESP” in
“Protocol”. Higher security means more complex implementation and lower
speed. DES is enough to meet general requirements. Use 3DES when high
confidentiality and security are required.
3DES
Authentication
Algorithm
Select from “MD5”, “SHA1”, “SHA2 256” or “SHA2 512” to be used in SA
negotiation.
MD5
PFS Group
Select from “DHgroup2”, “DHgroup5”, “DHgroup14”, “DHgroup15”,
“DHgroup16”, “DHgroup17” or “DHgroup18” to be used in SA negotiation.
DHgroup2
SA Lifetime
Set the IPsec SA lifetime. When negotiating to set up IPsec SAs, IKE uses the
smaller one between the lifetime set locally and the lifetime proposed by
the peer.
28800
DPD Interval
Set the interval after which DPD is triggered if no IPsec protected packets is
received from the peer. DPD is a Dead peer detection. DPD irregularly
detects dead IKE peers. When the local end sends an IPsec packet, DPD
checks the time the last IPsec packet was received from the peer. If the time
exceeds the DPD interval, it sends a DPD hello to the peer. If the local end
receives no DPD acknowledgment within the DPD packet retransmission
interval, it retransmits the DPD hello. If the local end still receives no DPD
acknowledgment after having made the maximum number of
retransmission attempts, it considers the peer already dead, and clears the
60