43
Chapter 6: Configuring the Wireless-G VPN Router
The VPN Tab - IPSec VPN
Wireless-G VPN Router with RangeBooster
it must be the same type of encryption that is being used by the VPN device at the other end of the tunnel. Or, you
may choose to disable this feature.
Authentication
. Authentication acts as another level of security. There are two types of authentication: MD5 and
SHA (SHA is recommended because it is more secure). As with encryption, either of these may be selected,
provided that the VPN device at the other end of the tunnel is using the same type of authentication. Or, both ends
of the tunnel may choose to disable authentication.
Pre-shared Key
. You can choose to use a Pre-shared Key or RSA Signature. To use the Pre-shared Key, click its
radio button. enter a series of numbers or letters in the
Pre-shared Key
field. Based on this word, which MUST be
entered at both ends of the tunnel, a key is generated to scramble (encrypt) the data being transmitted over the
tunnel, where it is unscrambled (decrypted). You may use any combination of up to 24 numbers or letters in this
field. No special characters or spaces are allowed.
PFS
. PFS (Perfect Forward Secrecy) ensures that the initial key exchange and IKE proposals are secure. To use
PFS, click the
Enabled
radio button.
ISAKMP Key Lifetime(s)
.The Field specifies how long an ISAKMP key channel should been kept, before being
renegotiated.
IPSec Key Lifetime(s)
. In this field, you may optionally select to have the key expire at the end of a time period
of your choosing. Enter the number of seconds you'd like the key to be used until a re-key negotiation between
each endpoint is completed.
Key Lifetime
. You may optionally select to have the key expire at the end of a time period of your choosing. Enter
the number of seconds you’d like the key to be useful, or leave it blank for the key to last indefinitely.
Advanced Settings Button
. Advanced Settings provide the administrator more detailed options to control the
whole IPSec tunnel construction procedure. Advanced Settings devides the original IPSec tunnel construction
procedure into 2 phases, Phase 1 is for ISAKMP SA establishment, and Phase 2 is for, after ISAKMP SA
established, IPSec Data Connection Encryption and Authentication Method.
Phase1
Tunnel Entry
. The configurating tunnel.
Operation Mode
. We support Main Mode operation in ISAKMP SA establishment.
Encryption Method
. You can select
3 ISAKMP
encryption method including 3DES to indicate 3DES
encryption with a key length of 192 bits, AES to indicate AES encryption with key length 256 bits.
Figure 6-41: Key Exchange Method - Auto(IKE)
Figure 6-42: Advanced Settings
Summary of Contents for WRV200
Page 1: ...Model No VPN Router with RangeBooster Wireless G WRV200 WIRELESS GHz 2 4802 11g User Guide ...
Page 10: ...Wireless G VPN Router with RangeBooster ...
Page 124: ...114 Appendix M Regulatory Information Wireless G VPN Router with RangeBooster ...
Page 125: ...115 Appendix M Regulatory Information Wireless G VPN Router with RangeBooster ...
Page 126: ...116 Appendix M Regulatory Information Wireless G VPN Router with RangeBooster ...