68
key negotiation is needed. Basically, manual key management is
used in small static environments or for troubleshooting purpose.
Notice that both sides must use the same Key Management method
(both Auto or both Manual). For Manual key management, all the
configurations need to match on both sides.
Manual
• Incoming/Outgoing SPI
The SPI (Security Parameter Index) is carried in the IPsec ESP
header. This enables the receiver to select the SA (Security As-
sociation), under which a packet should be processed. The SPI
is a 32-bit value. Both decimal and hexadecimal values are ac-
ceptable. e.g. “987654321” or “0x3ade68b1”. Each tunnel must
have unique an Inbound SPI and Outbound SPI. No two tunnels
share the same SPI. Notice that Inbound SPI must match the
other Router's Outbound SPI, and vice versa.
• Encryption
The Encryption method determines the complexity to en-
crypt/decrypt data packets. Only 3DES is supported. Notice that
both sides must use the same Encryption method.
• Authentication
Authentication determines a method to authenticate the data
packets to make sure they come from a trusted source. Either
MD5 or SHA1 may be selected. Notice that both sides (VPN
endpoints) must use the same Authentication method.
• MD5 - A one way hashing algorithm that produces a 128-
bit digest.
• SHA1 - A one way hashing algorithm that produces a 160-
bit digest.
• Encryption Key
This field specifies a key used to encrypt and decrypt data pack-
ets. Both characters and hexadecimal values are acceptable in
this field.
Note: that both sides must use the same Encryption Key.
• Authentication Key
This field specifies a key used to authenticate IP traffic. Both
characters and hexadecimal values are acceptable in this field.
Note: that both sides must use the same Authentication Key.
IKE with
Preshared Key
• Phase1 DH Group
Phase 1 is used to create a security association (SA). DH (Dif-
fie-Hellman) is a key exchange protocol that used during phase
1 of the authentication process to establish pre-shared keys.
There are three groups of different prime key lengths. Group 1
is 768 bits, Group 2 is 1,024 bits and Group 5 is 1,536 bits. If
network speed is preferred, select Group 1. If network security
is preferred, select Group 5.
• Phase 1 Encryption
There are five methods of encryption, DES, 3DES, AES-128,
AES-192 and AES-256. The Encryption method determines the
length of the key used to encrypt/decrypt ESP packets. DES is
56-bit encryption, 3DES is 168-bit encryption, AES-128 is 128-
bit encryption, AES-192 is 192-bit encryption and AES-256 is
256-bit encryption. DES is faster than 3DES, but 3DES is more
secure than DES. Both sides must use the same Encryption