Cisco RVS4000 - Gigabit Security Router Administration Manual page 63

4-port gigabit security router with vpn
Hide thumbs Also See for RVS4000 - Gigabit Security Router:
Table of Contents

Advertisement

Setting Up and Configuring the Router
VPN
Cisco RVS4000 Security Router with VPN Administrator Guide
Encryption
The Encryption method determines the length of the key used
to encrypt/decrypt ESP packets. Only 3DES is supported. Note that both
sides must use the same Encryption method.
Authentication
ESP packets. Either MD5 or SHA1 may be selected. Note that both sides
(VPN endpoints) must use the same Authentication method.
MD5
A one-way hashing algorithm that produces a 128-bit digest.
SHA1
A one-way hashing algorithm that produces a 160-bit digest.
Perfect Forward Secrecy
generates a new key material for IP traffic encryption and authentication.
Note that both sides must have this selected.
Preshared Key
IKE peer. Both character and hexadecimal values are acceptable in this
field; e.g., "My_@123" or "0x4d795f40313233". Note that both sides must
use the same Preshared Key.
Group
The Diffie-Hellman (DH) group to be used for key exchange. Select
the 768-bit (Group 1), 1024-bit (Group 2), or 1536-bit (Group 5) algorithm.
Group 5 provides the most security, Group 1 the least.
Key Life Time
time expires, a new key is renegotiated automatically. Enter a value from
300 to 100,000,000 seconds. The default is 3600 seconds.
Status
Status
Displays the connection status for the selected tunnel. The state is either
connected or disconnected.
Connect
Click this button to establish a connection for the current VPN tunnel. If
you have made any changes, click Save first to apply your changes.
Disconnect
Click this button to break a connection for the current VPN tunnel.
View Log
Click this button to view the VPN log, which shows details of each tunnel
established.
Advanced
Click this button to display these additional settings.
Authentication determines a method to authenticate the
If PFS is enabled, IKE Phase 2 negotiation
IKE uses the Preshared Key field to authenticate the remote
This specifies the lifetime of the IKE-generated key. If the
5
63

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents