Cisco RV042 Administration Guide - Page 143

IPSec Setup, IMPORTANT, Keying Mode, Manual, IKE with Preshared Key, Required fields for Manual mode

Page 143 highlights

VPN Setting Up a Remote Access Tunnel for VPN Clients (Client To Gateway) 9 IPSec Setup Enter the Internet Protocol Security settings for this tunnel. IMPORTANT: In order for any encryption to occur, the two ends of a VPN tunnel must agree on the methods of encryption, decryption, and authentication. • Keying Mode: Choose one of the following key management methods: - Manual: Choose this option if you want to generate the key yourself and you do not want to enable key negotiation. Manual key management is used in small static environments or for troubleshooting purposes. Enter the required settings. For information, see Required fields for Manual mode, page 143. - IKE with Preshared Key: Choose this option to use the Internet Key Exchange protocol to set up a Security Association (SA) for your tunnel. IKE uses a preshared key to authenticate the remote IKE peer. This setting is recommended and is selected by default. Enter the required settings. For more information, see Required fields for IKE with Preshared Key, page 144 and Advanced settings for IKE with Preshared Key, page 145. • Required fields for Manual mode Enter the settings for manual mode. - Incoming / Outgoing SPI: The Security Parameter Index is carried in the ESP (Encapsulating Security Payload Protocol) header and enables the receiver and sender to select the security association, under which a packet should be processed. You can enter hexadecimal values from 100~ffffffff. Each tunnel must have a unique Incoming SPI and Outgoing SPI. No two tunnels share the same SPI. The Incoming SPI here must match the Outgoing SPI value at the other end of the tunnel, and vice versa. - Encryption: Select a method of encryption: DES or 3DES. This setting determines the length of the key used to encrypt or decrypt ESP packets. DES is 56-bit encryption and 3DES is 168-bit encryption. 3DES is recommended because it is more secure. - Authentication: Select a method of authentication: MD5 or SHA1. The authentication method determines how the ESP packets are validated. MD5 is a one-way hashing algorithm that produces a 128-bit digest. SHA1 is a one-way hashing algorithm that produces a 160-bit digest. SHA1 is recommended because it is more secure. Make sure that both ends of the VPN tunnel use the same authentication method. Cisco Small Business RV0xx Series Routers Administration Guide 143

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199

VPN
Setting Up a Remote Access Tunnel for VPN Clients (Client To Gateway)
Cisco Small Business RV0xx Series Routers Administration Guide
143
9
IPSec Setup
Enter the Internet Protocol Security settings for this tunnel.
IMPORTANT:
In order for any encryption to occur, the two ends of a VPN tunnel
must agree on the methods of encryption, decryption, and authentication.
Keying Mode:
Choose one of the following key management methods:
-
Manual:
Choose this option if you want to generate the key yourself and
you do not want to enable key negotiation. Manual key management is
used in small static environments or for troubleshooting purposes. Enter
the required settings. For information, see
Required fields for Manual
mode, page 143
.
-
IKE with Preshared Key:
Choose this option to use the Internet Key
Exchange protocol to set up a Security Association (SA) for your tunnel.
IKE uses a preshared key to authenticate the remote IKE peer. This
setting is recommended and is selected by default. Enter the required
settings. For more information, see
Required fields for IKE with
Preshared Key, page 144
and
Advanced settings for IKE with
Preshared Key, page 145
.
Required fields for Manual mode
Enter the settings for manual mode.
-
Incoming
/
Outgoing SPI:
The Security Parameter Index is carried in the
ESP (Encapsulating Security Payload Protocol) header and enables the
receiver and sender to select the security association, under which a
packet should be processed. You can enter hexadecimal values from
100~ffffffff. Each tunnel must have a unique Incoming SPI and Outgoing
SPI. No two tunnels share the same SPI. The Incoming SPI here must
match the Outgoing SPI value at the other end of the tunnel, and vice
versa.
-
Encryption:
Select a method of encryption: DES or 3DES. This setting
determines the length of the key used to encrypt or decrypt ESP
packets. DES is 56-bit encryption and 3DES is 168-bit encryption. 3DES
is recommended because it is more secure.
-
Authentication:
Select a method of authentication: MD5 or SHA1. The
authentication method determines how the ESP packets are validated.
MD5 is a one-way hashing algorithm that produces a 128-bit digest.
SHA1 is a one-way hashing algorithm that produces a 160-bit digest.
SHA1 is recommended because it is more secure. Make sure that both
ends of the VPN tunnel use the same authentication method.