Nokia IP60 User Manual page 394

Security appliance
Hide thumbs Also See for IP60:
Table of Contents

Advertisement

Viewing VPN Tunnels
This field...
Displays...
Security
The type of encryption used to secure the connection, and the type of
Message Authentication Code (MAC) used to verify the integrity of the
message. This information is presented in the following format: Encryption
type/Authentication type.
In addition, if IPSec compression is enabled for the tunnel, this field displays
the
Note: All VPN settings are automatically negotiated between the two sites.
The encryption and authentication schemes used for the connection are the
strongest of those used at the two sites.
Your IP60 appliance supports AES, 3DES, and DES encryption schemes,
and MD5 and SHA authentication schemes.
Established
The time at which the tunnel was established.
This information is presented in the format hh:mm:ss, where:
hh=hours
mm=minutes
ss=seconds
Table 100: VPN Tunnels Icons
This icon...
Represents...
This gateway
A network for which an IKE Phase-2 tunnel was negotiated
A Remote Access VPN Server
A Site-to-Site VPN Gateway
A remote access VPN user
An L2TP user
394
icon.
Nokia IP60 Security Appliance User Guide

Advertisement

Table of Contents
loading

Table of Contents