Cisco RV215W Administration Manual page 108

Wireless-n vpn firewall
Hide thumbs Also See for RV215W:
Table of Contents

Advertisement

Configuring VPN
Configuring Advanced VPN Parameters
STEP 3
STEP 4
Cisco RV215W Wireless-N VPN Firewall Administration Guide
-
AES-192
-
AES-256
Authentication Algorithm—Specify the authentication algorithm for the
VPN header:
-
MD5
-
SHA-1
-
SHA2-256
Ensure that the authentication algorithm is configured identically on both
sides of the VPN tunnel (for example, the device and the router to which
it is connecting).
Pre-Shared Key—Enter the key in the space provided. Note that the
double-quote character (") is not supported in the pre-shared key.
Diffie-Hellman (DH) Group—Specify the DH Group algorithm, which is
used when exchanging keys. The DH Group sets the strength of the
algorithm in bits. Ensure that the DH Group is configured identically on both
sides of the IKE policy.
SA Lifetime—Enter the interval, in seconds, after which the Security
Association becomes invalid.
Dead Peer Detection—Check the Enable box to enable this feature, or
uncheck the box to disable it. Dead Peer Detection (DPD) is used to detect
whether the peer is alive or not. If the peer is detected as dead, the router
deletes the IPsec and IKE Security Association. If you enable this feature,
also enter these settings:
-
DPD Delay—Enter the interval, in seconds, between consecutive DPD
R-U-THERE messages. DPD R-U-THERE messages are sent only when
the IPsec traffic is idle.
-
DPD Timeout—Enter the maximum time that the device should wait to
receive a response to the DPD message before considering the peer to
be dead.
Check the XAUTH Type Enable check box to configure extended authentication
for your IPsec VPN policy. Provide the authentication username and password.
Click Save.
9
108

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents