Planet Networking & Communication LCG-300 Series User Manual page 110

Industrial lorawan gateway
Table of Contents

Advertisement

Object
Preshare Key
User and Password
Connection Type
ISAKMP
IKE SA Lifetime
ESP
ESP Keylife
Enter a pass phrase.
Create the username and password for the VPN client.
1.
Main.
2.
Aggressive.
It provides the way to create the SA between two PCs. The SA can
access the encoding between two PCs, and t he IT administrator can
assign to which key size or Preshare Key and algorithm to use. The SA
comes in many connection ways.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher by
using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen.
5. MD5 Algorithm: MD5 processes a v ariably long message into a
fixed-length output of 128 bits.
6. DH Group: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
You can specify how long IKE packets are valid.
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher by
using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen.
5. MD5 Algorithm: MD5 processes a v ariably long message into a
fixed-length output of 128 bits.
You can specify how long ESP packets are valid.
- 110 -
Industrial LoRaWAN Gateway
Description
LCG-300 series

Advertisement

Table of Contents
loading

This manual is also suitable for:

Lcg-300Lcg-300wLcg-300-nr

Table of Contents