Cisco RV042 Administration Guide - Page 134

Preshared Key, Advanced settings for IKE with, Required fields for Manual mode, Incoming - esp

Page 134 highlights

VPN Setting Up a Gateway to Gateway (Site to Site) VPN 9 Preshared Key, page 135 and Advanced settings for IKE with Preshared Key, page 136. • Required fields for Manual mode Enter the settings for manual mode. Be sure to enter the same settings when configuring other router for this tunnel. The Incoming / Outgoing SPI settings must be mirrored on the other router. - Incoming / Outgoing SPI: The Security Parameter Index is carried in the ESP (Encapsulating Security Payload Protocol) header and enables the receiver and sender to select the security association, under which a packet should be processed. You can enter hexadecimal values from 100~ffffffff. Each tunnel must have a unique Incoming SPI and Outgoing SPI. No two tunnels share the same SPI. The Incoming SPI here must match the Outgoing SPI value at the other end of the tunnel, and vice versa. - Encryption: Select a method of encryption: DES or 3DES. This setting determines the length of the key used to encrypt or decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption. 3DES is recommended because it is more secure. - Authentication: Select a method of authentication: MD5 or SHA1. The authentication method determines how the ESP packets are validated. MD5 is a one-way hashing algorithm that produces a 128-bit digest. SHA1 is a one-way hashing algorithm that produces a 160-bit digest. SHA1 is recommended because it is more secure. Make sure that both ends of the VPN tunnel use the same authentication method. - Encryption Key: Enter a key to use to encrypt and decrypt IP traffic. If you selected DES encryption, enter 16 hexadecimal values. If you selected 3DES encryption enter 40 hexadecimal values. If you do not enter enough hexadecimal values, then zeroes will be appended to the key to meet the required length. - Authentication Key: Enter a key to use to authenticate IP traffic. If you selected MD5 authentication, enter 32 hexadecimal values. If you selected SHA1, enter 40 hexadecimal values. If you do not enter enough hexadecimal values, then zeroes will be appended to the key to meet the required length. Cisco Small Business RV0xx Series Routers Administration Guide 134

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199

VPN
Setting Up a Gateway to Gateway (Site to Site) VPN
Cisco Small Business RV0xx Series Routers Administration Guide
134
9
Preshared Key, page 135
and
Advanced settings for IKE with
Preshared Key, page 136
.
Required fields for Manual mode
Enter the settings for manual mode. Be sure to enter the same settings when
configuring other router for this tunnel. The Incoming / Outgoing SPI settings
must be mirrored on the other router.
-
Incoming
/
Outgoing SPI:
The Security Parameter Index is carried in the
ESP (Encapsulating Security Payload Protocol) header and enables the
receiver and sender to select the security association, under which a
packet should be processed. You can enter hexadecimal values from
100~ffffffff. Each tunnel must have a unique Incoming SPI and Outgoing
SPI. No two tunnels share the same SPI. The Incoming SPI here must
match the Outgoing SPI value at the other end of the tunnel, and vice
versa.
-
Encryption:
Select a method of encryption: DES or 3DES. This setting
determines the length of the key used to encrypt or decrypt ESP
packets. DES is 56-bit encryption and 3DES is 168-bit encryption. 3DES
is recommended because it is more secure.
-
Authentication:
Select a method of authentication: MD5 or SHA1. The
authentication method determines how the ESP packets are validated.
MD5 is a one-way hashing algorithm that produces a 128-bit digest.
SHA1 is a one-way hashing algorithm that produces a 160-bit digest.
SHA1 is recommended because it is more secure. Make sure that both
ends of the VPN tunnel use the same authentication method.
-
Encryption Key:
Enter a key to use to encrypt and decrypt IP traffic. If
you selected DES encryption, enter 16 hexadecimal values. If you
selected 3DES encryption enter 40 hexadecimal values. If you do not
enter enough hexadecimal values, then zeroes will be appended to the
key to meet the required length.
-
Authentication Key:
Enter a key to use to authenticate IP traffic. If you
selected MD5 authentication, enter 32 hexadecimal values. If you
selected SHA1, enter 40 hexadecimal values. If you do not enter enough
hexadecimal values, then zeroes will be appended to the key to meet
the required length.