Planet WNAP-7350 User Manual page 65

802.11a/n wireless outdoor ap
Hide thumbs Also See for WNAP-7350:
Table of Contents

Advertisement

 IPSec Authentication
 IPSec Encryption
 SA connection Life
Time
 IKE Key Tries
 Local IP Address
 Peer IP Address
 Local Subnet
 Peer Subnet
 Local Gateway
 Peer Gateway
 IPSec Tunnel Name
 IPSec Secret Key
Group 2
Group 3
Group 4
Group 5
The AP supports SHA1 & MD5 authentication algorithms.
The AP supports DES, 3DES, AES, Blowfish, Twofish, Camellia
Encryption methods.
DES - 56-bit DES-CBC encryption algorithm
3DES - 168-bit DES encryption algorithm
AES - 128, 192 and 256-bit key AES-CBC encryption algorithm
Blowfish - a symmetric block cipher that can be used as a drop-in
replacement for DES or IDEA. It takes a variable-length key, from 32 bits
to 448 bits.
Twofish - Twofish has a 128-bit block size, a key size ranging from 128 to
256 bits, and is optimized for 32-bit CPUs.
Camellia - 128, 192 and 256-bit key Camellia encryption algorithm
This value describes the timeframe in hours for which the IKE SA is valid
and when the next rekeying should take place.
The field is used to specify the retry times of IKE Key.
This field is used to configure the IP address of the Untangle server on
the network configured in the Local Network field.
This field should contain the public IP address of the host to which the
IPSec VPN will be connected.
This field is used to configure the local network that will be reachable
from hosts on the other side of the IPSec VPN.
This field is used to configure the remote network that will be reachable
from hosts on the local side of the IPSec VPN.
This field is used to configure the Gateway of the Untangle server on the
network configured in the Local Network field.
This field should contain the public Gateway of the host to which the
IPSec VPN will be connected.
This field should contain a short name or description.
This field should contain the shared secret or PSK (pre-shared key) that
is used to authenticate the connection, and must be the same on both
sides of the tunnel for the connection to be successful. Because the PSK
is actually used as the encryption key for the session, using long strings
of a random nature will provide the highest level of security.
-58-
User Manual of WNAP-7350
1024 bits MODP group
EC2N group on GP(2^155)
EC2N group on GP(2^185)
1536 bits MODP group
RFC 2409
RFC 2409
RFC 2409
RFC 3526

Advertisement

Table of Contents
loading

Table of Contents