Symbol AP-51xx Product Reference Manual page 263

Table of Contents

Advertisement

IKE Authentication
Select the appropriate IKE authentication mode:
Mode
IKE Authentication
IKE provides data authentication and anti-replay services for the
Algorithm
VPN tunnel. Select an authentication methods from the drop-down
menu.
IKE Authentication
If you selected
Passphrase
must provide a passphrase.
IKE Encryption
Select the encryption and authentication algorithms for the VPN
Algorithm
tunnel from the drop-down menu.
Key Lifetime
The number of seconds the key is valid. At the end of the lifetime,
the key is renegotiated.
The
is no way to change the renegotiation value. If the IKE Lifetime is
greater than 3600, the keys still get renegotiated every 3600
seconds.
Pre-Shared Key (PSK) - Specify an authenticating algorithm
and passcode used during authentication.
RSA Certificates - Select this option to use RSA certificates
for authentication purposes. See the CA Certificates and Self
certificates screens to create and import certificates into the
system.
MD5 - Enables the Message Digest 5 algorithm. No keys are
required to be manually provided.
SHA1 - Enables Secure Hash Algorithm. No keys are
required to be manually provided.
Pre-Shared Key
DES - Uses the DES encryption algorithm. No keys are
required to be manually provided.
3DES - Enables the 3DES encryption algorithm. No keys are
required to be manually provided.
AES 128-bit - Uses the Advanced Encryption Standard
algorithm with 128-bit. No keys are required to be manually
provided.
AES 192-bit - Enables the Advanced Encryption Standard
algorithm with 192-bit. No keys are required to be manually
provided.
AES 256-bit - Uses the Advanced Encryption Standard
algorithm with 256-bit. No keys are required to be manually
provided.
access point
forces renegotiation every 3600 seconds. There
Configuring Access Point Security
as the authentication mode, you
6-49

Advertisement

Table of Contents
loading

Table of Contents