User's Manual

Table Of Contents
Configuring Virtual Private Networks (VPNs) and Security
Configuring VPNs
Cisco RV180/RV180W Administration Guide 111
5
DRAFT - CISCO CONFIDENTIAL
STEP 5 In the Domain Name 2 field, specify a domain name, which will be queried only
using the DNS server configured in the Domain Name Server 2 field.
NOTE Make sure that you avoid using overlapping subnets for remote or local traffic
selectors. Using these subnets would require adding static routes on the router and
the hosts to be used.
For example, a combination to avoid would be:
Local Traffic Selector: 192.168.1.0/24
Remote Traffic Selector: 192.168.0.0/16
Manual Policy Parameters
If you chose manual as the policy type in Step 4, configure the manual policy
parameters. The Manual Policy creates an SA (Security Association) based on the
following static inputs:
SPI-Incoming, SPI-Outgoing—Enter a hexadecimal value between 3 and 8
characters; for example, 0x1234.
Encryption Algorithm—Select the algorithm used to encrypt the data.
Key-In—Enter the encryption key of the inbound policy. The length of the
key depends on the algorithm chosen:
- DES—8 characters
- 3DES—24 characters
- AES-128—16 characters
- AES-192—24 characters
- AES-256—32 characters
- AES-CCM—16 characters
- AES-GCM—20 characters
Key-Out—Enter the encryption key of the outbound policy. The length of the
key depends on the algorithm chosen, as shown above.
Integrity Algorithm—Select the algorithm used to verify the integrity of the data.