Netgear DG834 DG834v3 Reference Manual - Page 78
Will either endpoint use Fully Qualified Domain Names FQDNs? FQDNs supplied
UPC - 606449029109
View all Netgear DG834 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 78 highlights
Reference Manual for the ADSL Modem Router DG834 v3 This set of configuration information defines a security association (SA) between the two VPN endpoints. When planning your VPN, you must make a few choices first: • Will the local end be any device on the LAN, a portion of the local network (as defined by a subnet or by a range of IP addresses), or a single PC? • Will the remote end be any device on the remote LAN, a portion of the remote network (as defined by a subnet or by a range of IP addresses), or a single PC? • Will either endpoint use Fully Qualified Domain Names (FQDNs)? FQDNs supplied by Dynamic DNS providers (see "The Use of a Fully Qualified Domain Name (FQDN)" on page B-8) can allow a VPN endpoint with a dynamic IP address to initiate or respond to a tunnel request. Otherwise, the side using a dynamic IP address must always be the initiator. • What method will you use to configure your VPN tunnels? - The VPN Wizard using VPNC defaults (see Table 6-2) - The typical automated Internet Key Exchange (IKE) setup (see "Using Auto Policy to Configure VPN Tunnels" on page 6-36) - A Manual Keying setup in which you must specify each phase of the connection (see "Using Manual Policy to Configure VPN Tunnels" on page 6-46)? Table 6-2. Parameters Recommended by the VPNC and Used in the VPN Wizard Parameter Secure Association Authentication Method Encryption Method Authentication Protocol Diffie-Hellman (DH) Group Key Life IKE Life Time Factory Default Main Mode Pre-shared Key 3DES SHA-1 Group 2 (1024 bit) 8 hours 1 hour • What level of IPSec VPN encryption will you use? - DES - The Data Encryption Standard (DES) processes input data that is 64 bits wide, encrypting these values using a 56 bit key. Faster but less secure than 3DES. - 3DES - (Triple DES) achieves a higher level of security by encrypting the data three times using DES with three different, unrelated keys. • What level of authentication will you use? 6-4 Virtual Private Networking (Advanced Feature) v1.1, October 2006