Configuration Guide

VPN advanced configuration 169
Configuration Guide
IPSec Gateway IP Address Specifies the Security remote endpoint address. All packets are secure up
to this destination.
Traffic Selector table
Local Address Type the Source IP address of the outbound traffic.
Local Address Mask Type the Network mask of the outbound traffic.
Remote Address Type the Destination IP address of the outbound traffic.
Remote Address Mask Type the Destination mask of the outbound traffic.
Protocol Select the traffic protocol for the source or destination address. Select one
of the following options:
•Any
•TCP
UDP
•ICMPv4
•AH
ESP
When you select a protocol and apply the IPSec policy, the policy is
applied on the selected protocol packets only. For example, if you select
ICMPv4, when you ping from one host to another, only ICMP packets are
encrypted or authenticated.
IKE Phase 1 Proposal table
IPSec Encryption Select the IPSec Encryption. Select one of the following options:
Data Encryption Standard (DES) – is a standard for encrypting data
that uses a 64 bit key to encrypt data, but only 56 bits are usable. This
standard is considered inadequate for data protection as this standard
do not match the speed of computer.
Triple Data Encryption Standard (3DES) – processes each block of
data using a different key each time resulting in a significantly more
secure message.
Advanced Encryption Standard (AES128, AES192, AES256) – has a
fixed block size of 128 bits and a key size of 128, 192 or 256 bits. Due
to the fixed block size of 128 bits, AES operates on a 4x4 array of
bytes.
Select DES if you prefer Network speed. Select 3-DES if your choice is
Network security.
IPSec Authentication Select the preferred authentication method.
Select HMAC-MAC5, the message authentication code is calculated using
the MD5 cryptographic hash function. This cryptographic hash function
has some additional security properties with a 128-bit hash value, which is
commonly used to check the integrity of files.
Select HMAC-SHA1, the message authentication code is calculated using
the SHA1 algorithm. This cryptographic hash function computes a
condensed digital representation to a high degree of probability.
Variable Value