User's Guide
Table Of Contents
- 1 Package Contents
- 2 Introduction to the Interface
- 3 Connecting and Configuring the MPC8377EWLAN Wireless Router
- 3.1 Connecting the MPC8377EWLAN Wireless Router (Wired Computing)
- 3.2 Connecting the MPC8377EWLAN Wireless Router (Wireless Computing)
- 3.3 Setting Up the IP Address
- 3.4 Configuring the MCP8377EWLAN Wireless Router
- 3.5 Changing the Operation Mode
- 3.6 Selecting DynDNS Settings
- 3.7 Firewalls
- 4 Selecting or Changing System Items
- 5 Status
- 6 VPN
- 7 Managing Storage, Samba, and File Editing in NAS
- 8 Intrusion Detection Systems
- 9 Intrusion Prevention Systems
- 10 Logout
MPC8377EWLAN Wireless Router SW User’s Guide 52
Figure 6-2 IKE with Preshared Key
Table 6-1 describes the IKE with preshared key options for phase 1 and phase 2.
Table 6-1 Phase 1 and Phase 2
Function Description
Phase 1
Encryption The encryption method determines the length of
the key used to encrypt or decrypt the ESP packets.
It supports 3DES. Notice that both sides of the
VPN tunnel must use the same Encryption method.
Authentication Authentication determines a method to authenticate
the ESP packets. You can select MD5 or SHA1.
Both sides of the VPN tunnel must use the same
authentication method.
Group This is for Diffie-Hellman key negotiation. There
are 3 groups available for ISAKMP SA
establishment, 768-bit, 1024-bit, 1536-bit. They
represent different bits used in Diffie-Hellman
mode operation
768-bit Group isn
’
t support
.
Lifetime (in sec) Specifies the lifetime of the IKE generated key.
Phase 2:
Encryption The encryption method determines the length of
the key used to encrypt or decrypt ESP packets. It