VPN
Gateway to Gateway
Cisco RV320/RV325 Administration Guide
87
8
•
Local Security Group Type—
LAN resources that can use this tunnel. The
Local Security Group is for this router’s LAN resources; the Remote Security
Group is for the other router’s LAN resources.
-
IP Address—
Specify one device that can use this tunnel. Enter the
IP
Address
of the device.
-
Subnet—
Allow all devices on a subnet to use the VPN tunnel. Enter the
subnetwork
IP Address
and
Subnet Mask
.
-
IP Range—
A range of devices that can use the VPN tunnel. Enter the
first IP address in
Begin IP
and the end IP address in
End IP
.
IPSec Setup
For encryption to be successful, the two ends of a VPN tunnel must agree on the
methods of encryption, decryption, and authentication. Enter exactly the same
settings on both routers.
Enter the settings for Phase 1 and Phase 2. Phase 1 establishes the preshared
keys to create a secure authenticated communication channel. In Phase 2, the IKE
peers use the secure channel to negotiate Security Associations on behalf of
other services such as IPsec. Be sure to enter the same settings when configuring
other router for this tunnel.
•
Phase 1 / Phase 2 DH Group—
DH (Diffie-Hellman) is a key exchange
protocol. There are three groups of different prime key lengths: Group 1 -
768 bits, Group 2 - 1,024 bits, and Group 5 - 1,536 bits. For faster speed and
lower security, choose
Group 1
. For slower speed and higher security,
choose
Group 5
. Group 1 is selected by default.
•
Phase 1 / Phase 2 Encryption—
Method of encryption for this phase: DES,
3DES, AES-128, AES-192, or AES-256. The method determines the length of
the key used to encrypt or decrypt ESP packets. AES-256 is recommended
because it is more secure.
•
Phase 1 / Phase 2 Authentication—
Method of authentication for this
phase: MD5 or SHA1. The authentication method determines how the ESP
(Encapsulating Security Payload Protocol) header packets are validated.
MD5 is a one-way hashing algorithm that produces a 128-bit digest. SHA1 is
a one-way hashing algorithm that produces a 160-bit digest. SHA1 is
recommended because it is more secure. Make sure that both ends of the
VPN tunnel use the same authentication method.
•
Phase 1 / Phase 2 SA Life Time—
Length of time a VPN tunnel is active in
this phase. The default value for Phase 1 is 28800 seconds. The default
value for Phase 2 is 3600 seconds.
Summary of Contents for Small Business RV320
Page 1: ...Cisco RV320 RV325 Gigabit Dual WAN VPN Router ADMINISTRATION GUIDE ...
Page 2: ...78 20928 01 ...
Page 10: ...Getting Started Features of the User Interface 10 Cisco RV320 RV325 Administration Guide 1 ...
Page 16: ...System Summary Log Setting Status 16 Cisco RV320 RV325 Administration Guide 2 ...
Page 54: ...DHCP Router Advertisement IPv6 54 Cisco RV320 RV325 Administration Guide 4 ...
Page 68: ...System Management Backup and Restore 68 Cisco RV320 RV325 Administration Guide 5 ...
Page 74: ...Port Management 802 1X Configuration 74 Cisco RV320 RV325 Administration Guide 6 ...
Page 80: ...Firewall Content Filter 80 Cisco RV320 RV325 Administration Guide 7 ...
Page 106: ...Certificate Management CSR Authorization 106 Cisco RV320 RV325 Administration Guide 9 ...
Page 118: ...Wizard 118 Cisco RV320 RV325 Administration Guide 12 ...
Page 122: ...Where to Go From Here 122 Cisco RV320 RV325 Administration Guide 14 Revised August 2014 ...