Tunnel Protocols

Chapter 3

 

Configuring an ANG-3000/7000

 

Table 2 IPSec Authentication Parameters

 

 

Parameter

Explanation

 

 

None

Disables the Signature Algorithm for IPSec packets; individual

 

packets are no longer signed and verified during transmission.

 

 

HMAC-SHA

Enables hashing message authentication codes (HMAC) that are

 

generated using the SHA cryptographic hashing function. HMAC-

 

SHA is generally regarded as stronger, more secure

 

cryptographic function than HMAC-MD5.

 

 

HMAC-MD5

Enables hashing message authentication codes (HMAC) that are

 

generated using the Rivest MD5 message digest algorithm

 

hashing function. While not as strong cryptographically as

 

HMAC-SHA, HMAC-MD5 provides better performance.

 

 

Time Period

Interval after which a new key is generated.

 

 

Data

Lifetime volume (in kilobytes) of the key after which a new key is

Transferred

generated.

 

 

8Click the Encryption tab.

9Do one of the following:

To set IPSec encryption parameters, choose IPSec from the Protocol menu. IPSec encryption parameters are shown in Figure 25. Select the IPSec Encryption Algorithm that determines how IPSec packets exchanged between the ANG and Aurorean Client remote users are encrypted.

To set PPTP encryption parameters, choose PPTP from the Protocol menu. PPTP encryption parameters are shown in Figure 25. Select the Microsoft Point-to-Point Encryption (MPPE) algorithm that determines how PPTP packets exchanged between the ANG and Aurorean remote users are encrypted.

46

RiverMaster Administrator’s Guide

Page 58
Image 58
Enterasys Networks Network Card manual Click the Encryption tab Do one of the following, Parameter Explanation