3Com 3CRWDR300A-73-US User Guide - Page 122

Local Party ID, IKE Keep Alive

Page 122 highlights

120 CHAPTER 5: CONFIGURING THE ROUTER 5 Select the Local Party ID, and then enter the ID, Network Address and Subnet Mask of the Local Secure Group. The network address of the local secure group is usually the network address of the local network. 6 From the Key Management drop-down menu, select either IKE Main Mode or IKE Aggressive Mode. 7 SA (Security Association) attribute - select the option to use for SA attribute. 8 In the Pre-shared Key field, enter the password for the connection. This must be unique for each connection rule that you create. 9 Select MD5, or SHA1 from the Authentication Algorithm drop-down menu. Both ends of the connection must use the same value. 10 Select DES, 3DES, Null, AES-128, AES-192, or AES-256 from the Encrypt Algorithm drop-down menu. Both ends of the connection must use the same value. 11 Enter the Key lifetime, in seconds. The default is 3600 seconds. The value must be at least 300 seconds. 12 PFS - Perfect Forward Secrecy, check this box, then the Diffie-Hellman Group options become available. The use o PFS is optional, enabling PFS will add another layer of encryption security. 13 Diffie-Hellman Group - select the group to use for Diffie-Hellman key exchange. 14 Check the IKE Keep Alive box to enable this function. The time value is the number of seconds that the router waits between sending IKE keepalive packets. 15 Click Apply.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

120
C
HAPTER
5: C
ONFIGURING
THE
R
OUTER
5
Select the
Local Party ID
, and then enter the ID, Network Address and
Subnet Mask of the Local Secure Group. The network address of the local
secure group is usually the network address of the local network.
6
From the
Key Management
drop-down menu, select either
IKE Main
Mode
or
IKE Aggressive Mode
.
7
SA (Security Association) attribute - select the option to use for SA
attribute.
8
In the
Pre-shared Key
field, enter the password for the connection. This
must be unique for each connection rule that you create.
9
Select
MD5
, or
SHA1
from the
Authentication Algorithm
drop-down
menu. Both ends of the connection must use the same value.
10
Select
DES
,
3DES
,
Null
,
AES-128
,
AES-192
, or
AES-256
from the
Encrypt
Algorithm
drop-down menu. Both ends of the connection must use the
same value.
11
Enter the Key lifetime, in seconds. The default is 3600 seconds. The value
must be at least 300 seconds.
12
PFS - Perfect Forward Secrecy, check this box, then the Diffie-Hellman
Group options become available. The use o PFS is optional, enabling PFS
will add another layer of encryption security.
13
Diffie-Hellman Group - select the group to use for Diffie-Hellman key
exchange.
14
Check the
IKE Keep Alive
box to enable this function. The time value is
the number of seconds that the router waits between sending IKE
keepalive packets.
15
Click
Apply
.