|
Setting/Setting Confirmation
213
Set it according to Local ID of the
opposite device. Normally, specify the
IPsec communication target LAN subnet
of the peer device.
are multiple subnets
subject to IPsec, input
more than one in remote
ID.
Encryption
Algorithms
Set the encryption algorithm to be used
at IKE phase 2.
•
AES256-CBC
•
AES192-CBC
•
AES128-CBC
•
3DES-CBC
•
NULL
AES256-CBC
Authentication
Algorithms
Set the authentication algorithm to be
used at IKE phase 2.
•
HMAC-SHA1-96
•
HMAC-SHA2-256
•
HMAC-MD5-96
HMAC-SHA1-96
Life Time (sec)
Set the validity period of the IPsec SA.
Input range is from 300 to 691,200
seconds.
Use a value that is smaller
than the one set at the
destination. Rekey is done
at random between from
70% to 85% of the set
lifetime.
28800
Life Time with Data
(Kbyte)
Specify the amount of data to
communicate on the IPsec SA in Kbytes.
Not specified
PFS
•
Disable: means PFS is not
guaranteed.
•
768bit: guarantees PFS using DH-
Group1
•
1024bit: guarantees PFS using DH-
Group2
•
1536bit: guarantees PFS using DH-
Group5
•
2048bit: guarantees PFS using DH-
Group14
PFS
(Perfect Forward Secrecy)
Disabled
Commit-bit
Check if Commit bit function is to be
used. The Commit bit is set at SA
establishment. When this product is a
responder, set the Commit bit.
Not specified
Rekey
•
Enable: IKE negotiation begins when
there is IPsec target traffic. Also,
rekeying is done when there is traffic
using the generated SA.
•
Always: IKE negotiation starts after
Enable