
|
| Prestige 652H/HW | |
|
| Table 10 VPN IKE | |
|
|
|
|
| LABEL | DESCRIPTION |
|
|
|
|
|
| Authentication | Select SHA1 or MD5 from the |
|
| Algorithm | (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The |
|
|
| SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 |
|
|
| for minimal security and |
|
| Advanced | Click Advanced to configure more detailed settings of your IKE key management. |
|
|
|
|
|
| Delete | Click Delete to remove this rule. |
|
|
|
|
|
5.12 Viewing SA Monitor
A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This screen displays active VPN connections. Use Refresh to display active VPN connections. This screen is
From the main screen, click Advanced Setup, and Monitor to view Security Associations.
When there is outbound traffic but no inbound traffic, the SA times out automatically after two minutes. A tunnel with no outbound or inbound traffic is "idle" and does not timeout until the SA lifetime period expires.
5.13 UPnP Overview
Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple
All
Windows ME and Windows XP support UPnP. See the Microsoft website for information about other Microsoft operating systems.
Make sure you apply Microsoft’s UPnP security patch before enabling the
UPnP feature. Refer to the Microsoft website.
5.14 Configuring UPnP
Click Advanced Setup and then UPnP to open the UPnP screen.
33