Industrial 5-Port 10/100/1000T VPN Security Gateway
IVR-100
- 71 -
Remote IP Address
Input the IP address of the remote host. For instance, "210.66.1.10”.
Remote Network
The remote subnet in CIDR notation. For instance, "210.66.1.0”.
Remote Netmask
The netmask of the remote host.
Dead Peer Detection
Set up the detection time of
DPD
(Dead Peer Detection).
By default, the DPD detection’s gap is 30 seconds, over 150 seconds
to think that is the broken line.
When VPN detects opposite party reaction time, the function will take
one of the actions: “Hold” stand for the system will retain IPSec SA,
"Clear" stand for the tunnel will clean away and waits for the new
sessions, "Restart" will delete the IPSec SA and reset VPN tunnel.
Preshare Key
Enter a pass phrase to be used to authenticate the other side of the
tunnel. Should be the same as the remote host.
IKE
Select the IKE (Internet Key Exchange) version.
Connection Type
1. Main.
2. Aggressive.
ISAKMP
It provides the way to create the SA between two PCs. The SA can
access the encoding between two PCs, and the IT administrator can
assign to which key size or Preshare Key and algorithm to use. The SA
comes in many connection ways.
1.
AES
: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2.
3DES
: Triple DES is a block cipher formed from the DES cipher
by using it three times. It can achieve an algorithm up to 168 bits.
3.
SHA1
: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4.
SHA2
: Either 256, 384 or 512 can be chosen
5.
MD5 Algorithm
: MD5 processes a variably long message into a
fixed-length output of 128 bits.
6.
DH Group
: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
IKE SA Lifetime
You can specify how long IKE packets are valid.
ESP
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
1.
AES
: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2.
3DES
: Triple DES is a block cipher formed from the DES cipher