EasyManuals Logo

Cisco RV180W Administration Guide

Cisco RV180W
187 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #124 background imageLoading...
Page #124 background image
Configuring VPN and Security
Configuring Advanced VPN Parameters
Cisco RV180/RV180W Administration Guide 115
5
Diffie-Hellman (DH) Group—Specify the DH Group algorithm, which is
used when exchanging keys. The DH Group sets the strength of the
algorithm in bits. Ensure that the DH Group is configured identically on both
sides of the IKE policy.
SA Lifetime—Enter the interval, in seconds, after which the Security
Association becomes invalid.
Dead Peer DetectionCheck the Enable box to enable this feature, or
uncheck the box to disable it. Dead Peer Detection (DPD) is used to detect
whether the peer is alive or not. If peer is detected as dead, the router
deletes the IPsec and IKE Security Association. If you enable this feature,
also enter these settings:
- Detection Period—Enter the interval, in seconds, between consecutive
DPD R-U-THERE messages. DPD R-U-THERE messages are sent only
when the IPsec traffic is idle.
- Reconnect after Failure Count—Enter the maximum number of DPD
failures allowed before tearing down the connection.
STEP 5 Optionally in the Extended Authentication section, enable Extended
Authentication (XAUTH). When connecting many VPN clients to a VPN gateway
router, XAUTH allows authentication of users with methods in addition to the
authentication method mentioned in the IKE SA parameters.
XAUTH TypeChoose one of the following options:
- None—Disables XAUTH.
- Edge Device—Authentication is done by one of the following methods:
User Database—User accounts created in the router are used to
authenticate users. After completing this procedure, enter the users on
the VPN > IPsec > VPN Users page.
See Configuring VPN Users, page 121.
RADIUS-PAP or RADIUS-CHAP—Authentication is done by using a
RADIUS server and either password authentication protocol (PAP) or
challenge handshake authentication protocol (CHAP). After completing
this procedure, set up the RADIUS server on the Security > RADIUS
Server page.
See Using the Cisco RV180/RV180W With a RADIUS Server,
page 127.

Table of Contents

Other manuals for Cisco RV180W

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco RV180W and is the answer not in the manual?

Cisco RV180W Specifications

General IconGeneral
BrandCisco
ModelRV180W
CategoryNetwork Router
LanguageEnglish

Related product manuals