Brother International ADS-3000N Network Users Guide - Page 82

Internet Key Exchange IKE, Use Prefixed Template

Page 82 highlights

Security Features Internet Key Exchange (IKE) IKE is a communication protocol used to exchange encryption keys to carry out encrypted communication using IPsec. To carry out encrypted communication this time only, the encryption algorithm necessary for IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are exchanged using the Diffie-Hellman key exchange method, and the encrypted communication that is limited to IKE is carried out. If you selected Custom in Use Prefixed Template, select IKEv1, IKEv2, or Manual. If you selected a setting other than Custom, the IKE, authentication type and Encapsulating Security selected in Use Prefixed Template are displayed. Authentication Type Configure the IKE authentication and encryption.  Diffie-Hellman Group This key exchange method allows secret keys to be securely exchanged over an unprotected network. 6 The Diffie-Hellman key exchange method uses a discrete logarithm problem, not the secret key, to send and receive the open information generated using a random number and the secret key. Select Group1, Group2, Group5, or Group14.  Encryption Select DES, 3DES, AES-CBC 128, or AES-CBC 256.  Hash Select MD5, SHA1, SHA256, SHA384 or SHA512.  SA Lifetime Specify the IKE SA lifetime. Type the time (seconds) and number of kilobytes (KByte). Encapsulating Security  Protocol Select ESP. NOTE ESP is a protocol for carrying out encrypted communication using IPsec. ESP encrypts the payload (communicated contents) and adds additional information. The IP packet consists of the header and the encrypted payload, which follows the header. In addition to the encrypted data, the IP packet also includes information regarding the encryption method and encryption key, the authentication data, and so on.  Encryption Select DES, 3DES, AES-CBC 128, or AES-CBC 256.  Hash Select MD5, SHA1, SHA256, SHA384, or SHA512.  SA Lifetime Specify the IPsec SA lifetime. Type the time (seconds) and number of kilobytes (KByte). 78

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114

Security Features
78
6
Internet Key Exchange (IKE)
IKE is a communication protocol used to exchange encryption keys to carry out encrypted communication
using IPsec. To carry out encrypted communication this time only, the encryption algorithm necessary for
IPsec is determined and the encryption keys are shared. For IKE, the encryption keys are exchanged using
the Diffie-Hellman key exchange method, and the encrypted communication that is limited to IKE is carried
out.
If you selected
Custom
in
Use Prefixed Template
, select
IKEv1
,
IKEv2
, or
Manual
.
If you selected a setting other than
Custom
, the IKE, authentication type and Encapsulating Security selected
in
Use Prefixed Template
are displayed.
Authentication Type
Configure the IKE authentication and encryption.
Diffie-Hellman Group
This key exchange method allows secret keys to be securely exchanged over an unprotected network.
The Diffie-Hellman key exchange method uses a discrete logarithm problem, not the secret key, to send
and receive the open information generated using a random number and the secret key.
Select
Group1
,
Group2
,
Group5
, or
Group14
.
Encryption
Select
DES
,
3DES
,
AES-CBC 128
, or
AES-CBC 256
.
Hash
Select
MD5
,
SHA1
,
SHA256
,
SHA384
or
SHA512
.
SA Lifetime
Specify the IKE SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).
Encapsulating Security
Protocol
Select
ESP
.
NOTE
ESP is a protocol for carrying out encrypted communication using IPsec. ESP encrypts the payload
(communicated contents) and adds additional information. The IP packet consists of the header and the
encrypted payload, which follows the header. In addition to the encrypted data, the IP packet also includes
information regarding the encryption method and encryption key, the authentication data, and so on.
Encryption
Select
DES
,
3DES
,
AES-CBC 128
, or
AES-CBC 256
.
Hash
Select
MD5
,
SHA1
,
SHA256
,
SHA384
, or
SHA512
.
SA Lifetime
Specify the IPsec SA lifetime.
Type the time (seconds) and number of kilobytes (KByte).