Planet IVR-100 Series User Manual page 109

Industrial 5-port 10/100/1000t vpn security gateway
Hide thumbs Also See for IVR-100 Series:
Table of Contents

Advertisement

ISAKMP
IKE SA Lifetime
ESP
ESP Keylife
Perfect
Forward
Secrecy (PFS)
It provides the way to create the SA between two PCs. The SA can
access the encoding between two PCs, and the IT administrator can
assign to which key size or Preshare Key and algorithm to use. The SA
comes in many connection ways.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher
by using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen
5. MD5 Algorithm: MD5 processes a variably long message into a
fixed-length output of 128 bits.
6. DH Group: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
You can specify how long IKE packets are valid.
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
1.
commonly seen and adopted nowadays.
3DES: Triple DES is a block cipher formed from the DES cipher
2.
by using it three times. It can achieve an algorithm up to 168
bits.
SHA1: The SHA1 is a revision of SHA. It has improved the
3.
shortcomings of SHA. By producing summary hash values, it
can achieve an algorithm up to 160 bits.
SHA2: Either 256, 384 or 512 can be chosen.
4.
MD5 Algorithm: MD5 processes a variably long message into
5.
a fixed-length output of 128 bits.
You can specify how long ESP packets are valid.
Set the function as enable or disable.
- 109 -
Industrial VPN Security Gateway
IVR-100_IVR-300 Series

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ivr-300 seriesIvr-300wIvr-300fp

Table of Contents