94 Establishing secure VPN connections
Configuring Gateway-to-Gateway tunnels
you chose. For each method, a key length is shown for both ASCII characters and
Hex characters.
Table 6-5
Table 6-5
Encryption key lengths
Method
Key length in character bytes
DES
8
3DES
24
AES-128
16
AES-192
24
AES-256
32
Table 6-6
defines authentication key lengths.
Table 6-6
Authentication key lengths
Method
Key length in character bytes
MD5
16
SHA1
20
Configuration tasks for static Gateway-to-Gateway tunnels
Table 6-7
describes the tasks that are required to configure a static Gateway-to-
Gateway VPN tunnel.
Note: Complete each step in
and then for the remote security gateway.
Table 6-7
Static Gateway-to-Gateway configuration tasks
Task
Configure a VPN Policy (Phase 2 IKE
negotiation).
(Optional)
Create a static tunnel
Define IPsec Security Association Parameters
defines encryption key lengths.
Table 6-7
twice: first for the local security gateway
SGMI
VPN > VPN Policies
VPN > Static Tunnels
VPN > Static Tunnels > IPsec Security
Association
Key length in Hex
18 (0x + 16 hex digits)
50 (0x + 20 hex digits)
18 (0x + 20 hex digits)
50 (0x + 20 hex digits)
66 (0x + 20 hex digits)
Key length in Hex
34 (0x + 16 hex digits)
42 (0x + 20 hex digits)
Need help?
Do you have a question about the 360R - Security Gateway SGS and is the answer not in the manual?