© Copyright 2012 TRENDnet. All Rights Reserved.
TRENDnet User’s Guide
TEW-659BRV
86
user accounts. Your router supports an internal user account database for
XAUTH authentication in the IPsec main configuration page. For XAUTH
configuration between VPN endpoints, one endpoint must be configured as the
XAUTH Server and the other configured as the XAUTH client.
Note:
Your router
does not support external authentication to external servers such as a RADIUS
server.
•
Server –
Configures your VPN tunnel as the XAUTH Server.
•
Client –
Configures your VPN tunnel as the XAUTH Client. Enter your
Username
and
Password
for authentication.
If your VPN tunnel is configured as the XAUTH server, to configure the user account in
the internal authentication database, click on
Configuration
at the top of the page,
click
on
Security Setting
, then click on
VPN-IPsec
, and click on
XAUTH
at the bottom of the
page.
You can enter the user account information (Username, Password) for XAUTH.
For the IKE and IPsec proposals, you can select different
Encryption
and
Authentication
methods. You are also able to create a second IKE and IPsec proposal in case the first
proposal cannot be negotiated with the VPN endpoint, it will use the second proposal
defined.
•
Encryption –
Select the encryption method. You can choose between
DES
,
3DES
,
AES-128
,
AES-192
, or
AES-256.
o
DES (Data Encryption Standard)
– Weaker encryption strength. It uses
a symmetric key algorithm with 56-bit key size.
o
3DES (Triple DES, TDEA Triple Data Encryption Algorithm)
–Applies
DES three times to each data block resulting in 168-bit key size. Better
encryption strength than DES but lower performance than AES.
o
AES-128/192/256 (Advanced Encryption Standard 128/192/256-bit
key sizes) –
(Recommended) Provides the strongest encryption
strength and best performance. You can choose 128, 192, or 256-bit
key size. As the bit and key size increase, the security strength also
increases.
o
Null
– IPsec only. Weaker encryption strength. And offers better
performance.
•
Authentication
– Select the authentication method. You can choose between
SHA1
or
MD5
.
o
SHA1 (Secure Hash Algorithm) –
(Recommended) Stronger than MD5
as it produces a longer hash key but slightly lower performance.
o
MD5 (Message Digest 5)
- Weaker than SHA1 as the hash key is
slightly shorter than SHA1 and provides higher performance.
•
DH (Diffie-Hellman) Group
- As the DH group numbers increase, the security
also increases. You can choose between
Group 1
,
Group 2
, or
Group 5
. This is
to configure the IKE proposal only. To configure the DH Group for the IPsec
proposal, configure PFS (Perfect Forward Secrecy)
o
Group 1 –
DH group 1 (768-bit)
o
Group 2 –
DH group 2 (1024-bit)
o
Group 5 –
DH group 5 (1536-bit)
Содержание TEW-659BRN
Страница 1: ...TRENDnet User s Guide Cover Page...
Страница 97: ......