Funkwerk bintec R1200 Manual page 339

Hide thumbs Also See for bintec R1200:
Table of Contents

Advertisement

Funkwerk Enterprise Communications GmbH
bintec R1xxx/R3xxx/R4xxx
Field
DH Group
Lifetime
Authentication Method
Description
Please note that the description of the encryption and authentic-
ation or the hash algorithms is based on the author's knowledge
and opinion at the time of creating this User Guide. In particular,
the quality of the algorithms is subject to relative aspects and
may change due to mathematical or cryptographic develop-
ments.
The Diffie-Hellman group defines the parameter set used as the
basis for the key calculation during phase 1. "MODP" as sup-
ported by bintec devices stands for "modular exponentiation".
Possible values:
• 1 (768-bit): During the Diffie-Hellman key calculation,
modular exponentiation at 768 bits is used to create the en-
cryption material.
• 2 (1024-bit): During the Diffie-Hellman key calculation,
modular exponentiation at 1024 bits is used to create the en-
cryption material.
• 5 (1536-bit): During the Diffie-Hellman key calculation,
modular exponentiation at 1536 bits is used to create the en-
cryption material.
Create a lifetime for phase 1 keys.
As for RFC 2407, the default value is eight hours, which means
the key must be renewed once eight hours have elapsed.
The following options are available for defining the lifetime:
Entry in Seconds: Enter the lifetime for phase 1 key in seconds.
The value can be a whole number from 0 to 2147483647. The
default value is 14400.
Entry in kBytes: Enter the lifetime for phase 1 keys as amount
of data processed in kBytes. The value can be a whole number
from 0 to 2147483647. The default value is 0.
The standard value as per RFC is used 0 seconds and 0
Kbytes are entered.
Select the authentication method.
Possible values:
11 VPN
325

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents