Robustel R1510 User Guide
RT_UG_R1510_v.1.0.1 Dec. 31, 2019 75/140
Select from “IKEv1” and “IKEv2”.
Select from “Main” and “Aggressive” for the IKE negotiation mode in phase 1.
If the IP address of one end of an IPsec tunnel is obtained dynamically, the IKE
negotiation mode must be aggressive. In this case, SAs can be established as
long as the username and password are correct.
Select from “3DES”, “AES128”, “AES192”and “AES256”to be used in IKE
negotiation.
3DES: Use 168-bit 3DES encryption algorithm in CBC mode
AES128: Use 128-bit AES encryption algorithm in CBC mode
AES192: Use 192-bit AES encryption algorithm in CBC mode
AES256: Use 256-bit AES encryption algorithm in CBC mode
Select from “MD5”, “SHA1”, “SHA2 256” or “SHA2 512” to be used in IKE
negotiation.
Select from “DHgroup1”,“DHgroup2”, “DHgroup5”, “DHgroup14”,
“DHgroup15”, “DHgroup16”, “DHgroup17” or “DHgroup18” to be used in key
negotiation phase 1.
Select from “PSK”, “CA”, “PKCS#12”, “xAuth PSK” and “xAuth CA” to be used
in IKE negotiation.
PSK: Pre-shared Key
CA: x509 Certification Authority
xAuth: Extended Authentication to AAA server
PKCS#12: Exchange digital certificate authentication
Enter the pre-shared key.
Select from “Default”, “FQDN” and “User FQDN” for IKE negotiation.
Default: Uses an IP address as the ID in IKE negotiation
FQDN: Uses an FQDN type as the ID in IKE negotiation. If this option is
selected, type a name without any at sign (@) for the local security