Siemens 5890 manual Siemens

Page 91

SIEMENS 5890 DSL Router

Chapter 6 Security Setup

User’s Guide

IKE/IPSec Configuration

 

 

3.Select one of the following security protocols:

AH (Authentication Header ) method, a security protocol that authenticates the sender of each data packet. If the AH protocol is selected, only packet authentication can be performed, not encryption. To select AH as the authentication method, select one of the following to use as the hashing algorithm for AH authentication from the AH Authentication Scheme drop-down menu:

-NONE: Requests no AH encapsulation.

-MD5: Requests AH encapsulation and authenticates using Message Digest 5.

-SHA1: Requests AH encapsulation and authenticates using Secure Hashing Algorithm 1.

ESP (Encapsulating Security Payload) method, a security protocol that completely encapsulates and optionally encrypts user data and/or authenticates the sender of each data packet. If the ESP protocol is selected, encryption, authentication, or both encryption and authentication can be performed.. To select ESP as the authentication method, select one of the following to use as the hashing algorithm hashing algorithm for ESP authentication from the ESP Authentication Scheme drop-down menu.

-NONE: Requests no ESP encapsulation.

-MD5: Requests ESP encapsulation and authenticates using Message Digest 5.

-SHA1: Requests ESP encapsulation and authenticates using Secure Hashing Algorithm 1.

4.If you selected ESP authentication, select one of the following from the ESP Encryption Type drop-down menu to specify the algorithm to use to encrypt ESP IPSec packets:

-DES: Encrypts using a 56-bit key.

-3DES: Encrypts using three 56-bit keys to produce 168-bit encryption.

-NULL: ESP encapsulation, but no data encryption. ESP encapsulation verifies the source, but data is sent in the clear to increase throughput.

-NONE: No ESP encapsulation and no encryption is used.

5.From the IP Compression Method drop-down menu, select one of the following to specify the algorithm to to use to compress IPSec packets: LZS IP compression or None.

6.In Phase II Proposal Lifetime, enter the number of seconds after the IPSec SA expires. The default is 1800 seconds. Once this time is elapsed, the system will renegotiate the IKE connection.

7.In Phase II Proposal Life Data, enter the amount of data, measured in kilobytes, before the IPSec SA terminates. After the specified quantity of data has been transferred, the system will renegotiate the IKE connection. If zero is entered, the data quantity will be unlimited. By setting a limit on the amount of data transferred, the risk of a key becoming compromised is reduced.

8.Click Apply.

SIEMENS

85

Image 91
Contents 5890 Software License Software License and Limited WarrantyGeneral Provisions Table of Contents Advanced Setup User SetupSecurity Setup Monitoring Router Back Panel Front PanelHardware Specifications Software Specifications PPP RFC 1661, RFC Frame RelaySecurity Package Contents Installation RequirementsPC Requirements Network Service Provider Requirements Hardware Installation Windows 98/ME PC ConfigurationSelect TCP/IP Protocol from the Network Protocols list Windows NTWindows Windows XP Mac OS Mac OSX Linux Establish Connection Configuring the RouterTo do this Refer to Router InformationSelect Protocol Access Easy Setup WizardIP Routing Enabled Bridging EnabledPoint-to-Point Protocol over ATM VC Multiplexing Block Net Bios Traffic NAT EnabledPoint-to-Point Protocol over ATM LLC Encapsulation NAT Enabled RFC 1483 Multiprotocol Encapsulation LLC/SNAP RFC 1483 VC Multiplexing Routed Point-to-Point Protocol over Ethernet over RFC1483 RFC 1483 MAC Encapsulated Routing MER RAW IP Dynamic Host Configuration Protocol Local Area Network Configuration User Management User SetupAdding/Modifying a User Account Deleting a User Account None User LookupLocal RadiusTrusted Secure Mode ConfigurationUntrusted Configure the Radius Server Configure the TacPlus Server Class Functional Areas Management ClassesChange Password Telnet Web Access ControlNo access restrictions Click Save and RebootAdvanced Setup Sdsl ATM or Sdsl Frame Relay WAN SelectionRemote File Configuration DMZ DMZ Router Clock Dhcp Dhcp Weighted Fair Queuing Differentiated Services FrameworkQoS Configure QoS policies Configure QoS Policy Siemens To the end Reorder QoS PoliciesBefore policy Routing Table Configuration Click Enable Dial Backup Dial BackupATM Traffic Shaping Unspecified Bit Rate Constant Bit RateReal-Time Variable Bit Rate Non Real-Time Variable Bit RateSwitch Management Switch Mirror Configuration Switch Age Time Command Line Interface File Editor Security Setup NAT NAT Server Configuration NAT Host Mapping Default DisablePort Number Click Add IP Range Snmp IP FilterEnter the New Password and New Password again Snmp PasswordKey Generator Secure ShellConfigure SSH Load Keys Key Generator Firewall Scripts Firewall Rules Stateful FirewallConfigure Stateful Firewall View Dropped Packets Configure Firewall Rules Application Protocol/PortDelete Firewall Rules IKE/IPSec Configuration Easy IKE/IPSec Setup IKE Peers Advanced IKE/IPSec SetupIKE Peers Definition IKE Proposals Definition IKE IPSec Proposals Definition Siemens IKE IPSec Policies Definition Siemens VPN Log On System Summary Monitoring RouterRemote Connection Information Ethernet Interface InformationSystem Information IP Routing InformationPPPoE Session DiagnosticsATM Statistics Interface InformationFiles Information Routing Table InformationMemory Usage List All Configuration DataTCP/IP Statistics