EasyManuals Logo

Cisco EPC3925 User Manual

Cisco EPC3925
106 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #60 background imageLoading...
Page #60 background image
60 4021192 Rev B
Configure Security
Section
Field Description
Key
Management
(continued)
Select one of the following options for the key exchange method:
Auto (IKE)
Encryption: The Encryption method determines the length of the key used
to encrypt/decrypt ESP packets. Notice that both sides must use the same
method.
Authentication: The Authentication method authenticates the
Encapsulating Security Payload (ESP) packets. Select MD5 or SHA. Notice
that both sides (VPN endpoints) must use the same method.
MD5: A one-way hashing algorithm that produces a 128-bit digest
SHA: A one-way hashing algorithm that produces a 160-bit digest
Perfect Forward Secrecy (PFS): If PFS is enabled, IKE Phase 2 negotiation
will generate new key material for IP traffic encryption and authentication.
Note that both sides must have PFS enabled.
Pre-Shared Key: IKE uses the Pre-Shared Key to authenticate the remote
IKE peer. Both character and hexadecimal values are acceptable in this
field, e.g., "My_@123" or "0x4d795f40313233". Note that both sides must use
the same Pre-Shared Key.
Key Lifetime: This field specifies the lifetime of the IKE generated key. If
the time expires, a new key will be renegotiated automatically. The Key
Lifetime may range from 300 to 100,000,000 seconds. The default lifetime is
3600 seconds.
Manual
Encryption: The Encryption method determines the length of the key used
to encrypt/decrypt ESP packets. Notice that both sides must use the same
method.
Encryption Key: This field specifies a key used to encrypt and decrypt IP
traffic. Both character and hexadecimal values are acceptable in this field.
Note that both sides must use the same Encryption Key.
Authentication: The Authentication method authenticates the
Encapsulating Security Payload (ESP) packets. Select MD5 or SHA. Notice
that both sides (VPN endpoints) must use the same method.
MD5: A one-way hashing algorithm that produces a 128-bit digest
SHA: A one-way hashing algorithm that produces a 160-bit digest
Authentication Key: This field specifies a key used to authenticate IP
traffic. Both character and hexadecimal values are acceptable in this field.
Note that both sides must use the same Authentication Key.
Inbound SPI/Outbound SPI: The Security Parameter Index (SPI) is carried
in the ESP header. This enables the receiver to select the SA, under which a
packet should be processed. The SPI is a 32-bit value. Both decimal and
hexadecimal values are acceptable. e.g., "987654321" or "0x3ade68b1". Each
tunnel must have a unique Inbound SPI and Outbound SPI. No two tunnels
share the same SPI. Note that the Inbound SPI must match the remote
gateway's Outbound SPI, and vice versa.

Other manuals for Cisco EPC3925

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco EPC3925 and is the answer not in the manual?

Cisco EPC3925 Specifications

General IconGeneral
Security algorithmsWEP, WPA, WPA-PSK, WPA2, WPA2-PSK
Wi-FiYes
Modulation128-QAM, 16-QAM, 32-QAM, 64-QAM, 8-QAM, QPSK
Frequency band2.4 GHz
Networking standardsIEEE 802.11n
USB 2.0 ports quantity1
Ethernet LAN (RJ-45) ports4
Input current1.5 A
Input voltage15 V
Input frequency50/60 Hz
Power requirements230 VAC
Power consumption (typical)17 W
Storage temperature (T-T)-20 - 70 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)0 - 95 %
Voice codecsG.711, G.723, G.726, G.728, G.729, G.729A
Weight and Dimensions IconWeight and Dimensions
Weight430 g
Dimensions (WxDxH)176 x 145 x 45 mm

Related product manuals