NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 246

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Table 7-12. Add VPN Policy Settings (continued)
Item
Integrity Algorithm
Key-In
Key-Out
Auto Policy Parameters
Note: These fields apply only when you select Auto Policy as the policy type.
SA Lifetime
Encryption Algorithm
Integrity Algorithm
7-36
Description (or Subfield and Description)
From the pull-down menu, select one of the following two algorithms to be
used in the VPN header for the authentication process:
• SHA-1. Hash algorithm that produces a 160-bit digest. This is the default
setting.
• MD5. Hash algorithm that produces a 128-bit digest.
The integrity key for the inbound policy. The length of the key depends on
the selected integrity algorithm:
• MD5: enter 16 characters.
• SHA-1: enter 20 characters.
The integrity key for he outbound policy. The length of the key depends on
the selected integrity algorithm. The required key lengths are the same as
for the Key-In (se above).
The lifetime of the Security Association (SA) is the period or the amount of
transmitted data after which the SA becomes invalid and must be
renegotiated. From the pull-down menu, select how the SA lifetime is
specified:
• Seconds. In the SA Lifetime field, enter a period in seconds. The minimum
value is 300 seconds. The default value is 3600 seconds.
• KBytes. In the SA Lifetime field, enter a number of kilobytes. The
minimum value is 1920000 KB.
From the pull-down menu, select one of the following five algorithms to
negotiate the security association (SA):
• DES. Data Encryption Standard (DES)
• 3DES. Triple DES. This is the default algorithm.
• AES-128. Advanced Encryption Standard (AES) with a 128-bits key size.
• AES-192. AES with a 192-bits key size.
• AES-256. AES with a 256-bits key size.
From the pull-down menu, select one of the following two algorithms to be
used in the VPN header for the authentication process:
• SHA-1. Hash algorithm that produces a 160-bit digest. This is the default
setting.
• MD5. Hash algorithm that produces a 128-bit digest.
Virtual Private Networking Using IPsec Connections
v1.0, September 2009

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents