Siemens 5890 manual IKE Proposals Definition

Page 89

SIEMENS 5890 DSL Router

Chapter 6 Security Setup

User’s Guide

IKE/IPSec Configuration

 

 

IKE Proposals Definition

IKE I proposals specify how packets will be encrypted/authenticated for Phase I. To define a new IKE proposal:

1.Click Create next to IKE Proposals from the Advanced IKE/IPSec Setup page. This displays the IKE Proposal Definition page.

2.In IKE Proposal Name, enter a logical name for the IKE Proposal Definition. This name is of no importance to the remote IKE peer.

3.From the Message Authentication Scheme drop-down menu, select one of the following hashing (authentication) options to use to validate IKE Phase I exchange:

MD5: Performs message authentication using Message Digest 5.

SHA1: Performs message authentication using Secure Hashing Algorithm 1 (default).

4.From the Diffie-Hellman (Oakley) Group drop-down menu, select one of the following Diffie-Hellman key generation groups to use during IKE Phase I exchange:

Group 1: Uses Diffie-Hellman Group 1 (768 bits).

Group 2: Uses Diffie-Hellman Group 2 (1024 bits).

5.From the Encryption Type drop-down menu, select one of the following encryption types to use during IKE Phase II (Quick Mode) exchange:

DES: Encrypts using a 56-bit key.

3DES: Encrypts using three 56-bit keys to produce 168-bit encryption.

6.In Phase I Proposal Lifetime, enter the number of seconds after which the Phase I negotiation expires. The default is 1800 seconds. Once this time is elapsed, the system will renegotiate the IKE connection.

7.Click Apply.

SIEMENS

83

Image 89
Contents 5890 Software License Software License and Limited WarrantyGeneral Provisions Table of Contents Security Setup User SetupAdvanced Setup Monitoring Router Back Panel Front PanelHardware Specifications Software Specifications Security Frame RelayPPP RFC 1661, RFC PC Requirements Installation RequirementsPackage Contents Network Service Provider Requirements Hardware Installation Windows 98/ME PC ConfigurationSelect TCP/IP Protocol from the Network Protocols list Windows NTWindows Windows XP Mac OS Mac OSX Linux Establish Connection Configuring the RouterTo do this Refer to Router InformationSelect Protocol Access Easy Setup WizardPoint-to-Point Protocol over ATM VC Multiplexing Bridging EnabledIP Routing Enabled Block Net Bios Traffic NAT EnabledPoint-to-Point Protocol over ATM LLC Encapsulation NAT Enabled RFC 1483 Multiprotocol Encapsulation LLC/SNAP RFC 1483 VC Multiplexing Routed Point-to-Point Protocol over Ethernet over RFC1483 RFC 1483 MAC Encapsulated Routing MER RAW IP Dynamic Host Configuration Protocol Local Area Network Configuration User Management User SetupAdding/Modifying a User Account Deleting a User Account Local User LookupRadius NoneUntrusted Secure Mode ConfigurationTrusted Configure the Radius Server Configure the TacPlus Server Class Functional Areas Management ClassesChange Password No access restrictions Access ControlClick Save and Reboot Telnet WebAdvanced Setup Sdsl ATM or Sdsl Frame Relay WAN SelectionRemote File Configuration DMZ DMZ Router Clock Dhcp Dhcp QoS Differentiated Services FrameworkWeighted Fair Queuing Configure QoS policies Configure QoS Policy Siemens Before policy Reorder QoS PoliciesTo the end Routing Table Configuration Click Enable Dial Backup Dial BackupATM Traffic Shaping Real-Time Variable Bit Rate Constant Bit RateNon Real-Time Variable Bit Rate Unspecified Bit RateSwitch Management Switch Mirror Configuration Switch Age Time Command Line Interface File Editor Security Setup NAT NAT Server Configuration NAT Host Mapping Port Number DisableDefault Click Add IP Range Snmp IP FilterEnter the New Password and New Password again Snmp PasswordKey Generator Secure ShellConfigure SSH Load Keys Key Generator Firewall Scripts Firewall Rules Stateful FirewallConfigure Stateful Firewall View Dropped Packets Configure Firewall Rules Application Protocol/PortDelete Firewall Rules IKE/IPSec Configuration Easy IKE/IPSec Setup IKE Peers Advanced IKE/IPSec SetupIKE Peers Definition IKE Proposals Definition IKE IPSec Proposals Definition Siemens IKE IPSec Policies Definition Siemens VPN Log On System Summary Monitoring RouterRemote Connection Information Ethernet Interface InformationSystem Information IP Routing InformationPPPoE Session DiagnosticsATM Statistics Interface InformationFiles Information Routing Table InformationMemory Usage List All Configuration DataTCP/IP Statistics