Phase 1 - Siemens SIMATIC NET SCALANCE S615 Configuration Manual

Industrial ethernet security web based management
Hide thumbs Also See for SIMATIC NET SCALANCE S615:
Table of Contents

Advertisement

● Remote ID
Enter the "Distinguished Name" or "Alternate Name" from the partner certificate. Only
when you use the partner certificate can you leave the box empty. The box is
automatically filled with the value from the partner certificate.
● PSK
Enter the key.
● PSK confirmation
Repeat the key.
4.8.4.5

Phase 1

Phase 1: Encryption agreement and authentication (IKE = Internet Key Exchange)
On this WBM page, you set the parameters for the protocol of the IPsec key management.
The key exchange uses the standardized IKE method for which you can set the following
protocol parameters.
Description
This table contains the following columns:
● Name
Shows the name of the VPN connection to which the settings relate.
● Encryption
For phase 1, select the required encryption algorithm.
The following encryption algorithms are supported:
– Auto: automatic detection
– 3DES-168
– AES-128
– AES-192
– AES-256
Note
The more bits in an encryption algorithm the safer the algorithm is. Depending on the
selected algorithm, the encryption takes longer and requires more computing power.
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
Configuring with Web Based Management
4.8 "Security" menu
165

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents