User's Manual

Table Of Contents
Enterprise 5-Port 10/100/1000T VPN Security Router
VR-300 series
- 106 -
Object
Description
With IPsec
Set the function as enable to make the L2TP work with IPsec encryption.
Preshare Key
Enter a pass phrase.
User and Password
Create the username and password for the VPN client.
Connection Type
1. Main.
2. Aggressive.
ISAKMP
It provides the way to create the SA between two PCs. The SA can
access the encoding between two PCs, and the IT administrator can
assign to which key size or Preshare Key and algorithm to use. The SA
comes in many connection ways.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher by
using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen.
5. MD5 Algorithm: MD5 processes a variably long message into a
fixed-length output of 128 bits.
6. DH Group: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
IKE SA Lifetime
You can specify how long IKE packets are valid.
ESP
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher by
using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen.
5. MD5 Algorithm: MD5 processes a variably long message into a
fixed-length output of 128 bits.
ESP Keylife
You can specify how long ESP packets are valid.