Configuring Virtual Private Networks (VPNs) and Security
Configuring Advanced VPN Parameters
Cisco RV220W Administration Guide 119
6
• Key-In—Enter the encryption key of the inbound policy. The length of the
key depends on the algorithm chosen:
- DES—8 characters
- 3DES—24 characters
- AES-128—16 characters
- AES-192—24 characters
- AES-256—32 characters
- AES-CCM—16 characters
- AES-GCM—20 characters
• Key-Out—Enter the encryption key of the outbound policy. The length of the
key depends on the algorithm chosen, as shown above.
• Integrity Algorithm—Select the algorithm used to verify the integrity of the
data.
• Key-In—Enter the integrity key (for ESP with Integrity-mode) for the inbound
policy. The length of the key depends on the algorithm chosen:
- MD5—16 characters
- SHA-1— 20 characters
- SHA2-256—32 characters
- SHA2-384— 48 characters
- SHA2-512—64 characters
• Key-Out—Enter the integrity key (for ESP with Integrity-mode) for the
outbound policy. The length of the key depends on the algorithm chosen, as
shown above.