VR-200 16-Port Multi-WAN VPN Router
• 95 •
Both sides must use the same Authentication method. MD5 is a one-way hashing
algorithm that produces a 128-bit digest.
z
Phase 1 SA Life Time:
SHA is a one-way hashing algorithm that produces a 160-bit
digest. SHA is recommended because it is more secure. This field allows you to
configure the length of time a VPN tunnel is active in Phase 1. The default value is
28,800 seconds.
z
Perfect Forward Secrecy:
If PFS is enabled, IKE Phase 2 negotiation will generate
a new key material for IP traffic encryption and authentication. If PFS is enabled, a
hacker using brute force to break encryption keys is not able to obtain other or future
IPSec keys.
z
Phase 2 DH Group:
There are three groups of different prime key lengths. Group1
is 768 bits, Group2 is 1,024 bits and Group 5 is 1,536 bits. If network speed is
preferred, select Group 1. If network security is preferred, select Group 5. You can
choose the different Group with the Phase 1 DH Group you chose. If Perfect
Forward Secrecy is disabled, there is no need to set up the Phase 2 DH Group since
no new key would be
generated, and the key of Phase 2 will be same with the key in
Phase 1.
z
Phase 2 Encryption:
Phase 2 is used to create one or more IPSec SAs, which are
then used to key IPSec sessions. There are three methods of encryption, DES,
3DES and AES. The Encryption method determines the length of the key used to
encrypt/decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit
encryption. In addition, AES includes three types of encryptions, AES-128, AES-192,
and AES-256. Both sides must use the same Encryption method. 3DES or AES is
recommended because it is more secure. If users enable the AH Hash Algorithm in
Advanced, it’s recommended to select Null to disable encrypt/decrypt ESP packets
in Phase 2, but both sides of tunnel must use the same setting.
z
Phase 2 Authentication:
There are two methods of authentication, MD5 and SHA.
The Authentication method determines a method to authenticate the ESP packets.
Both sides must use the same Authentication method. MD5 is a one-way hashing
algorithm that produces a 128-bit digest. SHA is a one-way hashing algorithm that