Figure 6-41: Key Exchange Method - Auto(Ike); Figure 6-42: Advanced Settings - Linksys WRV200 User Manual

2.4ghz 802.11g wireless-g vpn router with rangebooster
Table of Contents

Advertisement

Wireless-G VPN Router with RangeBooster
it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. Or, you
may choose to disable this feature.
Authentication. Authentication acts as another level of security. There are two types of authentication: MD5 and
SHA (SHA is recommended because it is more secure). As with encryption, either of these may be selected,
provided that the VPN device at the other end of the tunnel is using the same type of authentication. Or, both ends
of the tunnel may choose to disable authentication.
Pre-shared Key. You can choose to use a Pre-shared Key or RSA Signature. To use the Pre-shared Key, click its
radio button. enter a series of numbers or letters in the Pre-shared Key field. Based on this word, which MUST be
entered at both ends of the tunnel, a key is generated to scramble (encrypt) the data being transmitted over the
tunnel, where it is unscrambled (decrypted). You may use any combination of up to 24 numbers or letters in this
field. No special characters or spaces are allowed.
PFS. PFS (Perfect Forward Secrecy) ensures that the initial key exchange and IKE proposals are secure. To use
PFS, click the Enabled radio button.
ISAKMP Key Lifetime(s).The Field specifies how long an ISAKMP key channel should been kept, before being
renegotiated.
IPSec Key Lifetime(s). In this field, you may optionally select to have the key expire at the end of a time period
of your choosing. Enter the number of seconds you'd like the key to be used until a re-key negotiation between
each endpoint is completed.
Key Lifetime. You may optionally select to have the key expire at the end of a time period of your choosing. Enter
the number of seconds you'd like the key to be useful, or leave it blank for the key to last indefinitely.
Advanced Settings Button. Advanced Settings provide the administrator more detailed options to control the
whole IPSec tunnel construction procedure. Advanced Settings devides the original IPSec tunnel construction
procedure into 2 phases, Phase 1 is for ISAKMP SA establishment, and Phase 2 is for, after ISAKMP SA
established, IPSec Data Connection Encryption and Authentication Method.
Phase1
Tunnel Entry. The configurating tunnel.
Operation Mode. We support Main Mode operation in ISAKMP SA establishment.
Encryption Method. You can select 3 ISAKMP encryption method including 3DES to indicate 3DES
encryption with a key length of 192 bits, AES to indicate AES encryption with key length 256 bits.
Chapter 6: Configuring the Wireless-G VPN Router
The VPN Tab - IPSec VPN

Figure 6-41: Key Exchange Method - Auto(IKE)

Figure 6-42: Advanced Settings

43

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents