Enterasys Networks Network Card manual Click the Encryption tab Do one of the following, 224

Models: Network Card

1 276
Download 276 pages 57.43 Kb
Page 236
Image 236

Configuring Tunnel Protocols

Appendix B

 

ANG-3000/7000 Preconfiguration Stored on a Floppy Disk

 

Table 18 IPsec Authentication Parameters

 

 

Parameter

Explanation

 

 

None

Disables the Signature Algorithm for IPSec packets; individual

 

packets are no longer signed and verified during transmission.

 

 

HMAC-SHA

Enables hashing message authentication codes (HMAC) that are

 

generated using the SHA cryptographic hashing function. HMAC-

 

SHA is generally regarded as stronger, more secure cryptographic

 

function than HMAC-MD5.

 

 

HMAC-MD5

Enables hashing message authentication codes (HMAC) that are

 

generated using the Rivest MD5 message digest algorithm hashing

 

function. While not as strong cryptographically as HMAC-SHA,

 

HMAC-MD5 provides better performance.

 

 

Time Period

Interval after which a new key is generated. Default value: 60

 

minutes.

 

 

Data

Lifetime volume (in kilobytes) of the key after which a new key is

Transferred

generated. Default value: Disabled.

 

 

4Click the Encryption tab.

5Do one of the following:

To set IPSec encryption parameters, choose IPSec from the Protocol menu. IPSec encryption parameters are shown in Figure 125. Select the IPSec Encryption Algorithm that determines how IPSec packets exchanged between Aurorean Network Gateways are encrypted.

To set PPTP encryption parameters, choose PPTP from the Protocol menu. PPTP encryption parameters are shown in Figure 125. Select the Microsoft Point-to-Point Encryption (MPPE) algorithm that determines how PPTP packets exchanged between ANGs are encrypted.

224

RiverMaster Administrator’s Guide

Page 236
Image 236
Enterasys Networks Network Card manual Click the Encryption tab Do one of the following, 224