Robustel R1520 User Guide
RT056_UG_R1520_v.1.0.3 Dec. 25, 2021 86/159
3DES: Use 168-bit 3DES encryption algorithm in CBC mode
AES128: Use 128-bit AES encryption algorithm in CBC mode
AES128: Use 192-bit AES encryption algorithm in CBC mode
AES256: Use 256-bit AES encryption algorithm in CBC mode
Select from “DHgroup1”,“DHgroup2”, “DHgroup5”, “DHgroup14”,
“DHgroup15”, “DHgroup16”, “DHgroup17” or “DHgroup18” to be used in key
negotiation phase 1.
Select from “PSK”, “CA”, “xAuth PSK” ,”PKCS#12”and “xAuth CA” to be used in
IKE negotiation.
PSK: Pre-shared Key
CA: Certification Authority
xAuth: Extended Authentication to AAA server
PKCS#12: Exchange digital certificate authentication
Enter the pre-shared key.
Select from “Default”, “FQDN” and “User FQDN” for IKE negotiation.
Default: Uses an IP address as the ID in IKE negotiation
FQDN: Uses an FQDN type as the ID in IKE negotiation. If this option is
selected, type a name without any at sign (@) for the local security
router, e.g., test.robustel.com
User FQDN: Uses a user FQDN type as the ID in IKE negotiation. If this
option is selected, type a name string with a sign “@” for the local
security router, e.g., test@robustel.com
Select from “Default”, “FQDN” and “User FQDN” for IKE negotiation.
Default: Uses an IP address as the ID in IKE negotiation
FQDN: Uses an FQDN type as the ID in IKE negotiation. If this option is
selected, type a name without any at sign (@) for the local security
router, e.g., test.robustel.com
User FQDN: Uses a user FQDN type as the ID in IKE negotiation. If this
option is selected, type a name string with a sign “@” for the local
security router, e.g., test@robustel.com
Set the lifetime in IKE negotiation. Before an SA expires, IKE negotiates a new
SA. As soon as the new SA is set up, it takes effect immediately and the old
one will be cleared automatically when it expires.
Enter the private key under the “CA” and “xAuth CA” authentication types.
Enter the username used for the “xAuth PSK” and “xAuth CA” authentication
types.
Enter the password used for the “xAuth PSK” and “xAuth CA” authentication
types.
If click VPN > IPsec > Tunnel > General Settings, and choose ESP as protocol. The specific parameter configuration is
shown as below.