EasyManua.ls Logo

Case 6401 - Advanced Settings

Case 6401
107 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Case Communications 6401 Rugged ADSL Router Manual Rev 1.5
SECTION 5 ADVANCED CONFIGURATION Page 5.64
5.16.3 ADVANCED SETTINGS
This is a dynamic page. It will change itself by showing and hiding options when different types or
connections are chosen. User can select automatic key exchange or manual key exchange, pre-shared
key authentication or certificate authentication, etc.
When automatic key exchange method is used, click “Show Advanced Settings” will show more
options towards the bottom of the screen. The advanced options are shown in the screen shot below.
This page allows manual configuration of the IP Sec parameters these are explained below.
Advanced IKE Settings
There are two Phases available and both can be edited to different settings if requires.
Mode: Recommendation
Select Main Mode to configure the standard negotiation parameters for IKE phase1.
Main - The Initiator send a proposal containing encryption methods used to and the Responder
selects one and uses it. All further negotiation between the Initiator and Responder are
encrypted. Select Main Mode to configure the standard negotiation parameters for IKE
phase1.
Aggressive Quicker negotiation method, but the Initiator and Responder’s IDs are passed un-
encrypted. Select Aggressive Mode to configure IKE phase1 of the VPN Tunnel to carry out
negotiation in a shorter amount of time. (Not Recommended-Less Secure)
Encryption Algorithm: DES, 3DES, AES-128, AES-192 or AES-256 This determines the
algorithm used for encryption. Default is 3DES,
Integrity Algorithm: MD5, SHA1 encryption techniques used by IPSec to make sure that a
message has not been altered. Default is MD5, but SHA1 is used by Cisco.
Select Diffie-Hellman Group for Key Exchange: 768bit, 1024bit, 1536bit, 2048bit, 3072bit,
4096bit, 6144bit or 8192bit a public key encryption method used by IPSec to establish a shared
secret key.
Key Life Time: Enter the number of seconds for the IPSec lifetime. It is the period of time before
establishing a new IPSec security association (SA) with the remote endpoint. Default value is 3600.
(1 Hour) As the tunnel is re-started users will be disconnected and re-connected.

Table of Contents

Related product manuals