EasyManua.ls Logo

Welotec TK800 - Page 158

Welotec TK800
161 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Now you can start with the configuration. Proceed as follows:
1. IKEv1 and IKEv2 Policy:
To confirm your settings, press the Add” button.
ID is used to identify the policy in the tunnel configuration and can be selected freely. The input field is an
integer field.
Encryption contains a selection list of encryption methods, e.g. AES256.
Hash contains the hash algorithm, e.g. SHA1 or SHA2‑256.
Diie‑Hellman Group oers the possibility to choose the key strength during the key exchange process.
The higher the group, the higher the encryption, e.g. Group2 = 1024 Bit.
Lifetime is the period of validity of the IKE before it is renegotiated.
2. IPsec Policy:
The name is used to identify the policy in the tunnel configuration and can be freely chosen.
Encapsulating Security Payload (ESP) provides authentication, integrity and confidentiality of IP packets
within IPsec. In contrast to Authentication Header (AH), the user data is transmitted in encrypted form.
While AH can “only ensure the integrity and authenticity” of data, ESP increases data security depending
on the encryption algorithm chosen. That is why ESP is usually used instead of AH. ESP ensures the confi‑
dentiality of the communication. The packets are encrypted. In addition, an integrity protection protects
against manipulation. Choose the appropriate protocol for “Encapsulation.
Welotec GmbH
Zum Hagenbach 7
48366 Laer
www.welotec.com
info@welotec.com
+49 2554 9130 00
Page 157

Related product manuals