User's Manual
Table Of Contents
- WavePoint™ Product Safety
- Preface
- Chapter 1: Introduction
- Key Features and Supported Protocols
- Requirements
- Accessories
- Product Variations
- WavePoint 10e Labels
- WavePoint™ Components
- Certified Antennas
- Connect Power
- Network Deployment Scenarios
- Connecting and Logging In
- Configuration Pages
- Chapter 2: Configuring Basic WavePoint™ Network Features
- Chapter 3: Additional Data Networking Features
- Chapter 4: Configuring Wireless Access
- Example: Point-to-Point Configuration
- Point-to-Multipoint Configuration Examples
- Configuring Wireless Communication
- Defining Advanced Radio Settings
- Verify the Wireless Connection
- Enabling Virtual Access Points
- Wireless Security
- Scheduling When Wireless Connections are Available
- Chapter 5: Security
- Chapter 6: Management and Administration
- Set Up Remote Access to the WAN Port
- User Access Management
- Software Maintenance
- System Logging
- Simple Network Management Protocol (SNMP)
- Authentication Certificates
- Setting the Date and Time
- System Statistics
- Chapter 7: Diagnostics and Troubleshooting
- Appendix A: Factory Default Settings
- Chapter B: Installation Instructions
- Appendix C: WavePoint™ Configurations
- Appendix D: Bench Test Verification of WavePoint™ Configuration
- Appendix E: WavePoint 10e Technical Specifications
- Glossary
- Index
WavePoint 10e
54. Enter the SA Lifetime time or amount of data value, and select which measure to use.
This defines the amount of time, in seconds, or the amount of data allowed to pass, in
Kbytes, for which the Security Association remains effective.
Note: When configuring a Lifetime in kilobytes (also known as lifebytes), be aware
that two SAs are created for each policy. One SA applies to inbound traffic,
and one SA applies to outbound traffic. Due to differences in the upstream
and downstream traffic flows, the SA may expire asymmetrically.
Example: If the downstream traffic is very high, the lifebyte for a download
stream may expire frequently. The lifebyte of the upload stream may not expire as
frequently. It is recommended that the values be reasonably set, to reduce the
difference in expiry frequencies of the SAs; otherwise the system may eventually
run out of resources as a result of this asymmetry. The lifebyte specifications are
generally recommended for advanced users only.
55. Set the Encryption Algorithm option to On to enable an Encryption Method.
56. Select an Encryption Method to encrypt the data.
Note: If BLOWFISH is selected, it requires a Key Length in a multiple of 8
between 40 and 448.
If CAST128 is selected, it requires a Key Length in a multiple of 8 between
40 and 128.
57. Set the Integrity Algorithm option to On to enable Integrity Algorithm.
58. Select one Integrity Algorithm to verify the integrity of the data.
59. Select one PFS (Perfect Forward Secrecy) Key Group.
This ensures a Diffie-Hellman exchange is performed for every phase-2 negotiation.
Note: This selection will cause the WavePoint 10e to run slower.
Configure Phase 2 Manual Policy Parameters
Complete this additional information in the Phase 2 (Manual Policy Parameters) section for the
Phase 2 Manual Policy Parameters.
60. Enter a SPI - Incoming hexadecimal value between 3 and 8 characters.
The value must match the remote VPN endpoint’s Outgoing value.
61. Enter a SPI - Outgoing hexadecimal value between 3 and 8 characters.
The value must match the remote VPN endpoint’s Incoming value.
62. Select one Encryption Algorithm to encrypt the data.
LUM0063AA Rev 05/05/2014 Page 117 of 171
This document is the property of FreeWave Technologies, Inc. and contains proprietary information owned by
FreeWave®. This document cannot be reproduced in whole or in part by any means without written permission from
FreeWave Technologies, Inc.