Planet Networking & Communication LCG-300 Series User Manual page 104

Industrial lorawan gateway
Table of Contents

Advertisement

ISAKMP
IKE SA Lifetime
ESP
ESP Keylife
Perfect
Forward
Secrecy (PFS)
It provides the way to create the SA between two PCs. The SA can
access the encoding between two PCs, and the IT administrator can
assign to which key size or Preshare Key and algorithm to use. The SA
comes in many connection ways.
1. AES: All using a 1 28-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher
by using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a r evision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen
5. MD5 Algorithm: MD5 processes a variably long message into a
fixed-length output of 128 bits.
6. DH Group: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
You can specify how long IKE packets are valid.
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
1.
AES: All using a 12 8-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2.
3DES: Triple DES is a block cipher formed from the DES cipher
by using it three times. It can achieve an algorithm up to 168
bits.
3.
SHA1: The SHA1 is a r evision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it
can achieve an algorithm up to 160 bits.
4.
SHA2: Either 256, 384 or 512 can be chosen.
5.
MD5 Algorithm: MD5 processes a variably long message into
a fixed-length output of 128 bits.
You can specify how long ESP packets are valid.
Set the function as enable or disable.
- 104 -
Industrial LoRaWAN Gateway
LCG-300 series

Advertisement

Table of Contents
loading

This manual is also suitable for:

Lcg-300Lcg-300wLcg-300-nr

Table of Contents