Technicolor CGM4231 Operation Manual page 80

Wireless gateway
Table of Contents

Advertisement

Remote Secure Group
Remote Secure
Gateway
Key Management
1/8/2018
Remote Secure Group.
IP Address:
Enter the IP address on the local network.
Subnet Mask:
If the Subnet option is selected, enter the mask to determine
the IP Addresses on the local network.
Select the remote LAN user(s) behind the remote gateway
who can use this VPN tunnel. This may be a single IP
address, a sub--network, or any addresses. If Any is set, the
Gateway acts as a responder and accepts requests from
any remote user. Note that the Remote Secure Group must
match the remote gateway's Local Secure Group.
IP Address:
Enter the IP address on the remote network.
Subnet Mask:
If the Subnet option is selected, enter the mask to determine
the IP addresses on the remote network.
Select the desired option, IP Address.,
Key Exchange Method:
The device supports both automatic and manual key
management.
When automatic key management is selected, Internet Key
Exchange (IKE) protocols are used to negotiate key material
for Security Association (SA). If manual key management is
selected, no key negotiation is needed. Basically, manual
key management is used in small static environments or for
troubleshooting purposes.
Note that both sides must use the same key management
method.
Encryption Algorithm:
The Encryption method determines the length of the key
used to Encrypt/decrypt ESP packets. Note that both sides
must use the Same method.
Available Options are DES, 3DES, AES-128, AES-129,
AES-256
Authentication Algorithm:
The Authentication method authenticates the Encapsulating
Security
Payload (ESP) packets. Select MD5 or SHA. Notice that
both sides (VPN Endpoints) must use the same method.
MD5: A one--way hashing algorithm that produces a
128--bitdigests
SHA1: A one--way hashing algorithm that produces a
160--bitdigests
Pre-Shared Key:
IKE uses the Pre--Shared Key to authenticate the remote
Proprietary and Confidential - Technicolor
80

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents