Cisco Small Business RV220W Administration Manual page 119

Wireless-n network security firewall
Hide thumbs Also See for Small Business RV220W:
Table of Contents

Advertisement

Configuring Virtual Private Networks (VPNs) and Security
Configuring Advanced VPN Parameters
Cisco RV220W Administration Guide
Key-In—Enter the encryption key of the inbound policy. The length of the
key depends on the algorithm chosen:
-
DES—8 characters
-
3DES—24 characters
-
AES-128—16 characters
-
AES-192—24 characters
-
AES-256—32 characters
-
AES-CCM—16 characters
-
AES-GCM—20 characters
Key-Out—Enter the encryption key of the outbound policy. The length of the
key depends on the algorithm chosen, as shown above.
Integrity Algorithm—Select the algorithm used to verify the integrity of the
data.
Key-In—Enter the integrity key (for ESP with Integrity-mode) for the inbound
policy. The length of the key depends on the algorithm chosen:
-
MD5—16 characters
-
SHA-1— 20 characters
-
SHA2-256—32 characters
-
SHA2-384— 48 characters
-
SHA2-512—64 characters
Key-Out—Enter the integrity key (for ESP with Integrity-mode) for the
outbound policy. The length of the key depends on the algorithm chosen, as
shown above.
6
119

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents