Brother International ADS-3000N Network Users Guide - Page 79

IKEv1 Settings for an IPsec Template, Internet Key Exchange IKE

Page 79 highlights

Security Features IKEv1 Settings for an IPsec Template 6 Template Name Type a name for the template (up to 16 characters). Use Prefixed Template Select Custom, IKEv1 High Security, IKEv1 Medium Security, IKEv2 High Security, or IKEv2 Medium Security. The setting items are different depending on the selected template. NOTE The default template may differ depending on whether you selected Main or Aggressive for Negotiation Mode on the IPsec configuration screen. Internet Key Exchange (IKE) IKE is a communication protocol used to exchange encryption keys to carry out encrypted communication 6 using IPsec. To carry out encrypted communication this time only, the encryption algorithm necessary for IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are exchanged using the Diffie-Hellman key exchange method, and the encrypted communication limited to IKE is carried out. If you selected Custom in Use Prefixed Template, select IKEv1, IKEv2, or Manual. If you selected a setting other than Custom, the IKE, authentication type and Encapsulating Security selected in Use Prefixed Template are displayed. Authentication Type Configure the IKE authentication and encryption.  Diffie-Hellman Group This key exchange method allows secret keys to be securely exchanged over an unprotected network. The Diffie-Hellman key exchange method uses a discrete logarithm problem, not the secret key, to send and receive open information that was generated using a random number and the secret key. Select Group1, Group2, Group5, or Group14.  Encryption Select DES, 3DES, AES-CBC 128, or AES-CBC 256.  Hash Select MD5, SHA1, SHA256, SHA384 or SHA512.  SA Lifetime Specify the IKE SA lifetime. Type the time (seconds) and number of kilobytes (KByte). Encapsulating Security  Protocol Select ESP, AH+ESP or AH. 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114

Security Features
75
6
IKEv1 Settings for an IPsec Template
6
Template Name
Type a name for the template (up to 16 characters).
Use Prefixed Template
Select
Custom
,
IKEv1 High Security
,
IKEv1 Medium Security
,
IKEv2 High Security
, or
IKEv2 Medium
Security
. The setting items are different depending on the selected template.
NOTE
The default template may differ depending on whether you selected
Main
or
Aggressive
for
Negotiation
Mode
on the
IPsec
configuration screen.
Internet Key Exchange (IKE)
IKE is a communication protocol used to exchange encryption keys to carry out encrypted communication
using IPsec. To carry out encrypted communication this time only, the encryption algorithm necessary for
IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are exchanged using
the Diffie-Hellman key exchange method, and the encrypted communication limited to IKE is carried out.
If you selected
Custom
in
Use Prefixed Template
, select
IKEv1
,
IKEv2
, or
Manual
. If you selected a setting
other than
Custom
, the IKE, authentication type and Encapsulating Security selected in
Use Prefixed
Template
are displayed.
Authentication Type
Configure the IKE authentication and encryption.
Diffie-Hellman Group
This key exchange method allows secret keys to be securely exchanged over an unprotected network.
The Diffie-Hellman key exchange method uses a discrete logarithm problem, not the secret key, to send
and receive open information that was generated using a random number and the secret key.
Select
Group1
,
Group2
,
Group5
, or
Group14
.
Encryption
Select
DES
,
3DES
,
AES-CBC 128
, or
AES-CBC 256
.
Hash
Select
MD5
,
SHA1
,
SHA256
,
SHA384
or
SHA512
.
SA Lifetime
Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).
Encapsulating Security
Protocol
Select
ESP
,
AH+ESP
or
AH
.