Prestige 652H/HW

 

 

Table 10 VPN IKE

 

 

 

 

 

LABEL

DESCRIPTION

 

 

 

 

 

 

Authentication

Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1

 

 

Algorithm

(Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The

 

 

 

SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5

 

 

 

for minimal security and SHA-1for maximum security.

 

 

Advanced

Click Advanced to configure more detailed settings of your IKE key management.

 

 

 

 

 

 

Delete

Click Delete to remove this rule.

 

 

 

 

 

5.12 Viewing SA Monitor

A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This screen displays active VPN connections. Use Refresh to display active VPN connections. This screen is read-only.

From the main screen, click Advanced Setup, and Monitor to view Security Associations.

When there is outbound traffic but no inbound traffic, the SA times out automatically after two minutes. A tunnel with no outbound or inbound traffic is "idle" and does not timeout until the SA lifetime period expires.

5.13 UPnP Overview

Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.

All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention.

Windows ME and Windows XP support UPnP. See the Microsoft website for information about other Microsoft operating systems.

Make sure you apply Microsoft’s UPnP security patch before enabling the

UPnP feature. Refer to the Microsoft website.

5.14 Configuring UPnP

Click Advanced Setup and then UPnP to open the UPnP screen.

33