Prestige 334W User’s Guide
| Table | |
|
| |
LABEL | DESCRIPTION | |
|
| |
| Define the length of time before an IKE SA automatically renegotiates in this | |
| field. It may range from 60 to 3,000,000 seconds (almost 35 days). A short SA | |
SA Life Time | Life Time increases security by forcing the two VPN gateways to update the | |
encryption and authentication keys. However, every time the VPN tunnel | ||
| ||
| renegotiates, all users accessing remote resources are temporarily | |
| disconnected. | |
|
| |
| You must choose a key group for phase 1 IKE setup. DH1 (default) refers to | |
Key Group | ||
| Group 2 a 1024 bit (1Kb) random number. | |
| Type your | |
communicating party during a phase 1 IKE negotiation. It is called | ||
because you have to share it with another party before you can communicate | ||
| ||
| with them over a secure connection. | |
|
| |
IKE Phase 2 | A phase 2 exchange uses the IKE SA established in phase 1 to negotiate the SA | |
for IPSec. | ||
| ||
| Select Tunnel mode or Transport mode from the drop down | |
Encapsulation Mode | Prestige's encapsulation mode should be identical to the secure remote | |
| gateway. | |
| Select ESP or AH from the | |
| should be identical to the secure remote gateway. The ESP (Encapsulation | |
| Security Payload) protocol (RFC 2406) provides encryption as well as the | |
| authentication offered by AH. If you select ESP here, you must select options | |
IPSec Protocol | from the Encryption Algorithm and Authentication Algorithm fields (described | |
below). The AH protocol (Authentication Header Protocol) (RFC 2402) was | ||
| ||
| designed for integrity, authentication, sequence integrity (replay resistance), and | |
| ||
| you select AH here, you must select options from the Authentication Algorithm | |
| field. | |
|
| |
| The encryption algorithm for the Prestige and the secure remote gateway should | |
| be identical. When DES is used for data communications, both sender and | |
| receiver must know the same secret key, which can be used to encrypt and | |
Encryption Algorithm | decrypt the message. The DES encryption algorithm uses a | |
| DES (3DES) is a variation on DES that uses a | |
| more secure than DES. It also requires more processing power, resulting in | |
| increased latency and decreased throughput. |
VPN Screens |