Gaoke BG9008W User Manual page 69

Table of Contents

Advertisement

Proposal Name:
IPSec Protocol:
Encryption Algorithm:
Auth Algorithm:
3.4.7.4.4 IPSEC Safety Policy
In this table, you can view the information of IPSEC policy.
Choose the menu Data Service→VPN→IPSec→IPSEC Safety Policy to load the following page.
Click the Index in the entry you want to modify. If you want to delete the entry, select it and click the Del.
Click the Add button to add a new entry.
BG9008W User Manual
Specify a unique name to the IPSEC Proposal for identification and
management purposes. The IPSEC proposal can be applied to IPSEC
policy.
Select the security protocol to be used. Options include:
AH: AH (Authentication Header) provides data origin authentication, data
integrity and anti-replay services.
ESP: ESP (Encapsulating Security Payload) provides data encryption in
addition to origin authentication, data integrity, and anti-replay services.
ESP+AH: Both ESP and AH security protocol.
Select the algorithm used to encrypt the data for ESP encryption. Options
include:
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text
with a 56-bit key. The key should be 8 characters.
3DES: Triple DES, encrypts a plain text with 168-bit key. The key should
be 24 characters.
AES: Uses the AES algorithm for encryption. The key should be 16
characters.
Select the algorithm used to verify the integrity of the data. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary
length and generates a 128-bit message digest.
SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th
power of 2 in bits and generates a 160-bit message digest.
Figure 3-84 View IPSEC Safety Policy Configuration
Page 58 of 133

Advertisement

Table of Contents
loading

Related Products for Gaoke BG9008W

Table of Contents