User Guide

Table Of Contents
165
Parameter
Description
message tampering, leading to higher security than MD5.
Diffle-Hellman
Group
Group information for the Diffie-Hellman algorithm for generating a session key used to
encrypt an IKE tunnel. The information should be the same as that of the remote gateway.
Key Expiration
It specifies the life cycle of IKE SA. The default time is 3600 seconds. The minimum time is
600 seconds. When 540 seconds are left, IKE SA will be negotiated again.
PFS
It indicates Perfect Forward Secrecy that improves security by forcing a new Diffie-Hellman
exchange whenever key expires.
Key negotiation: Manual
The following configuration area appears in case that the Tunnel Protocol is set to AH+ESP.
Parameter description
Parameter
Description
ESP Encryption
Algorithm
The router supports the following ESP encryption algorithms:
- 3DES (default): Three 56-bit keys are used for encryption. A key of 24 ASCII
characters or 48 hexadecimal characters is required.
- DES: A 56-bit key is used to encrypt 64-bit data. The last 8 bits of the 64-bit data are
used for parity check. A key of 8 ASCII characters or 16 hexadecimal characters is
required.
- AES-128: A 128-bit key is used for encryption. A key of 16 ASCII characters or 32