User's Guide

Table Of Contents
MPC8377EWLAN Wireless Router SW User’s Guide 52
Figure 6-2 IKE with Preshared Key
Table 6-1 describes the IKE with preshared key options for phase 1 and phase 2.
Table 6-1 Phase 1 and Phase 2
Function Description
Phase 1
Encryption The encryption method determines the length of
the key used to encrypt or decrypt the ESP packets.
It supports 3DES. Notice that both sides of the
VPN tunnel must use the same Encryption method.
Authentication Authentication determines a method to authenticate
the ESP packets. You can select MD5 or SHA1.
Both sides of the VPN tunnel must use the same
authentication method.
Group This is for Diffie-Hellman key negotiation. There
are 3 groups available for ISAKMP SA
establishment, 768-bit, 1024-bit, 1536-bit. They
represent different bits used in Diffie-Hellman
mode operation
768-bit Group isn
t support
.
Lifetime (in sec) Specifies the lifetime of the IKE generated key.
Phase 2:
Encryption The encryption method determines the length of
the key used to encrypt or decrypt ESP packets. It