EasyManuals Logo

Cisco RVS4000 - Gigabit Security Router Administration Guide

Cisco RVS4000 - Gigabit Security Router
195 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #62 background imageLoading...
Page #62 background image
Setting Up and Configuring the Router
VPN
Cisco RVS4000 Security Router with VPN Administrator Guide 62
5
domain name in the Domain Name field. Then select either IP Address or
IP by DNS Resolved from the drop-down menu, and fill in the IP Address
field or Domain Name field.
Remote Security Group Type Select the remote LAN user(s) behind the remote
gateway who can use this VPN tunnel. This may be a single IP address or a Sub-
network. Note that the Remote Security Group Type must match the other routers
Local Security Group Type.
IP Address Enter the IP address on the remote network.
Subnet Mask If the Remote Security Group Type is set to Subnet, enter the mask
to determine the IP addresses on the remote network.
IPSec Setup
Keying Mode The router supports both automatic and manual key management.
When choosing automatic key management, IKE (Internet Key Exchange) protocols
are used to negotiate key material for SA (Security Association). If manual key
management is selected, no key negotiation is needed. Basically, manual key
management is used in small static environments or for troubleshooting purposes.
Note that both sides must use the same Key Management method.
Phase 1
Encryption The Encryption method determines the length of the key used
to encrypt/decrypt ESP packets. Only 3DES is supported. Notice that both
sides must use the same Encryption method.
Authentication Authentication determines a method to authenticate the
ESP packets. Either MD5 or SHA1 may be selected. Notice that both sides
(VPN endpoints) must use the same Authentication method.
MD5 A one-way hashing algorithm that produces a 128-bit digest.
SHA1 A one-way hashing algorithm that produces a 160-bit digest.
Group The Diffie-Hellman (DH) group to be used for key exchange. Select
the 768-bit (Group 1), 1024-bit (Group 2), or 1536-bit (Group 5) algorithm.
Group 5 provides the most security, Group 1 the least.
Key Life Time This specifies the lifetime of the IKE-generated key. If the
time expires, a new key is renegotiated automatically. Enter a value from
300 to 100,000,000 seconds. The default is 28800 seconds.
Phase 2

Table of Contents

Other manuals for Cisco RVS4000 - Gigabit Security Router

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco RVS4000 - Gigabit Security Router and is the answer not in the manual?

Cisco RVS4000 - Gigabit Security Router Specifications

General IconGeneral
WAN Ports1 x 10/100/1000 Mbps
LAN Ports4 x 10/100/1000 Mbps
VPN SupportIPSec, PPTP
WirelessNo
QoSYes
Power Supply12V DC, 1.5A
Humidity10% to 85% non-condensing
FirewallSPI Firewall
VPN Throughput30 Mbps
Operating Temperature32°F to 104°F (0°C to 40°C)
Storage Temperature-4°F to 158°F (-20°C to 70°C)
ManagementWeb-based

Related product manuals