User Guide
Chapter 5. Administrative Information Base
Algorithms to be used for IKE Negotiations — Encryption algorithm to
be used for protection of the IKEv2 exchanges. Options (choose one):
<3DES-SHA1>, <AES128-SHA1>, <AES192-SHA1>, <AES256-SHA1>.
Lifetime of the IKE SA in seconds — Maximum duration of the IKEv2
Security Association that controls the IPsec tunnel between the
OmniAccess 3500 NLG card and the OmniAccess 3500 NLG gateway.
Lifetime of the IPsec SA in seconds — Maximum duration of the IPsec
Security Association that carries encrypted packets from one end of the
secure remote access connection to the other.
Figure 67 - Connection Manager Tunnel Table (Add)
o Assisted File Transfer — [Gateway|Configure Advanced Settings], [Configure:],
[r]
Configuration of the OmniAccess 3500 NLG Assisted File Transfer facility for IT
applications integrated in the OmniAccess 3500 NLG platform. The OmniAccess
3500 NLG gateway allocates a fixed amount of storage space for each
application. The other configuration parameters drive the transport aspects of
the file transfer transactions.
− Application Table — [Gateway|Configure Advanced Settings|Application
Table], [Gateway:-> Application Table Information], [rw]
List of applications that utilize the Assisted File Transfer utility. The
following information items are displayed for every application listed:
Application Name, Share Path, User Name, Domain Name, Laptop Directory,
Laptop Directory Owner, Direction, and Max Disk Space (MB).
89