
OfficeConnect VPN Firewall User’s Manual Chapter 14. Configuring IPSec VPN
85
The following encryption algorithms are supported.
MD-5
SHA-1
Enter the IKE security association life time in seconds.
Select a proper Diffie-Hellman key exchange algorithm
from the drop-down list. Currently, the following
algorithms are supported:
DH Group 1
DH Group 2
DH Group 5
Select the IPSec encryption from the drop-down list.
The following encryption algorithms are supported.
DES
3DES
AES-128
AES-192
AES-256
Select the IKE authentication from the drop-down list.
The following encryption algorithms are supported.
MD-5
SHA-1
PFS stands for perfect forward secrecy.You may
choose to use the same keys (generated when the IKE
tunnel is created) for all re-negotiations or you can
choose to generate new keys for every re-negotiation.
Select ―None‖ to use the same keys for all the re-
negotiations. Select a specific DH (Diffie-Hellman)
group to generate new keys for every re-negotiation.
The supported DH groups are DH-1, DH-2 and DH-5.
The greater the group number, the more secure the
connection is. However, the greater the group number,
the more time it takes to negotiate a tunnel.
Enter the life time of IPSec security association in
seconds, minutes, hours or days and kilo bytes.
Default value is 3600 seconds.
Manual Key Specific Options
Enter the encryption key. To enter the encryption key
in hex, start with 0x.
Enter the authentication. To enter the authentication
key in hex, start with 0x.
Enter the inbound security parameter index.
Enter the outbound security parameter index.
14.2 Establish VPN Connection Using Automatic
Keying
This section describes the steps to establish the VPN tunnel using the
Configuration Manager. Internet Key Exchange (IKE) is the automatic keying
protocol used to exchange the key that is used to encrypt/authenticate the data
Komentarze do niniejszej Instrukcji