Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual page 72

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

4-18 WS2000 Wireless Switch System Reference Guide
3. Forward secrecy is a key-establishment protocol that guarantees that the discovery of a session key or a
long-term private key will not compromise the keys of any other sessions. Select
Perfect Forward Secrecy
4. If
Perfect Forward Secrecy
G1 - 768bit
G2- 1024bit
5. In the
Security Association Life Time
association will last before the VPN client will need to reauthenticate.
6. Select the type of authentication from the
and anti-replay services for the VPN tunnel.
None
MD5
SHA1
7. Select the
ESP Type
None
ESP
ESP with
Authentication
8. If
ESP
or
ESP with Authentication
DES
menu to enable this option. Select
is enabled, select an IKE Authentication Algorithm.
Diffie-Hellman Group 1 Authentication uses a 768 bit algorithm for key exchange.
Somewhat faster than the 1024-bit algorithm, but secure enough in most situa-
tions
Diffie-Hellman Group 2 Authentication uses a 1024 bit algorithm for key exchange.
Somewhat slower than the 768-bit algorithm, but much more secure and a better
choice for extremely sensitive situations.
field, enter a value (in minutes) that indicates how long the
Disables AH authentication and the rest of the fields in this area will not be active.
Enables the Message Digest 5 algorithm, which requires 128-bit (32-character hexa-
decimal) authentication keys.
Enables Secure Hash Algorithm 1, which requires 160-bit (40-character hexadecimal)
keys.
from the menu.
Disables ESP and the rest of the fields in this area will not be active.
Enables Encapsulating Security Payload encryption for this tunnel.
Enables Encapsulating Security Payload encryption with authentication for this tunnel.
is enabled, select an
This options selects the DES encryption algorithm, which requires 64-bit (16-character
hexadecimal) keys.
No
to disable Perfect Forward Secrecy.
AH Authentication
menu. AH provides data authentication
Encryption Algorithm
Yes
from the
Use
from the menu.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents