Draytek Vigor 2700 User Manual page 97

Vigor 2700 series firewall router
Hide thumbs Also See for Vigor 2700:
Table of Contents

Advertisement

IPSec Security Method
Medium
Advanced
Vigor2700 Series User's Guide
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Authentication Header (AH)- means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)- means payload
(data) will be encrypted and authenticated. Select from below:
DES without Authentication -Use DES encryption algorithm
and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication algorithm.
AES without Authentication-Use AES encryption algorithm
and not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm and
apply MD5 or SHA-1 authentication algorithm.
Specify mode, proposal and key life of each IKE phase,
Gateway etc.
The window of advance setup is shown as below:
IKE phase 1 mode -Select from Main mode and Aggressive
mode. The ultimate outcome is to exchange security proposals
to create a protected secure channel. Main mode is more secure
than Aggressive mode since more exchanges are done in a
secure channel to set up the IPSec session. However, the
Aggressive mode is faster. The default value in Vigor router is
Main mode.
IKE phase 1 proposal-To propose the local available
authentication schemes and encryption algorithms to the VPN
peers, and get its feedback to find a match. Two combinations
are available for Aggressive mode and nine for Main mode. We
suggest you select the combination that covers the most
schemes.
IKE phase 2 proposal-To propose the local available
algorithms to the VPN peers, and get its feedback to find a
match. Three combinations are available for both modes. We
suggest you select the combination that covers the most
algorithms.
91

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents