HP OfficeConnect Firewall Series Instrukcja Użytkownika Strona 99

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
Przeglądanie stron 98
OfficeConnect VPN Firewall User’s Manual Chapter 14. Configuring IPSec VPN
85
Options
Description
Authentication
The following encryption algorithms are supported.
MD-5
SHA-1
SA-Lifetime
Enter the IKE security association life time in seconds.
DH
Select a proper Diffie-Hellman key exchange algorithm
from the drop-down list. Currently, the following
algorithms are supported:
DH Group 1
DH Group 2
DH Group 5
IPSec Proposal Settings
IPSec Encryption
Select the IPSec encryption from the drop-down list.
The following encryption algorithms are supported.
DES
3DES
AES-128
AES-192
AES-256
IPSec
Authentication
Select the IKE authentication from the drop-down list.
The following encryption algorithms are supported.
MD-5
SHA-1
PFS
PFS stands for perfect forward secrecy.You may
choose to use the same keys (generated when the IKE
tunnel is created) for all re-negotiations or you can
Options
Description
choose to generate new keys for every re-negotiation.
Select ―None‖ to use the same keys for all the re-
negotiations. Select a specific DH (Diffie-Hellman)
group to generate new keys for every re-negotiation.
The supported DH groups are DH-1, DH-2 and DH-5.
The greater the group number, the more secure the
connection is. However, the greater the group number,
the more time it takes to negotiate a tunnel.
Life Times
Enter the life time of IPSec security association in
seconds, minutes, hours or days and kilo bytes.
Default value is 3600 seconds.
Manual Key Specific Options
Encryption Key
Enter the encryption key. To enter the encryption key
in hex, start with 0x.
Authentication
Key
Enter the authentication. To enter the authentication
key in hex, start with 0x.
SPI-Incoming
Enter the inbound security parameter index.
SPI-Outgoing
Enter the outbound security parameter index.
14.2 Establish VPN Connection Using Automatic
Keying
This section describes the steps to establish the VPN tunnel using the
Configuration Manager. Internet Key Exchange (IKE) is the automatic keying
protocol used to exchange the key that is used to encrypt/authenticate the data
Przeglądanie stron 98
1 2 ... 94 95 96 97 98 99 100 101 102 103 104 ... 155 156

Komentarze do niniejszej Instrukcji

Brak uwag