D-Link DWC-1000 DWC-1000 User's Guide - Page 99

DWC-1000 Wireless Controller User's Guide, NAT Keep Alive Frequency

Page 99 highlights

Field NAT Keep Alive Frequency Local Identifier Type Local Identifier Remote Identifier Type Remote Identifier Encryption Algorithm Authentication Algorithm VPN Settings Description If NAT Traversal = On, use this option to control the keep-alive-frequency value. Keep-alive packets are sent at the specified time interval and are used to keep the NAT mappings alive on the NAT device. Setting this value to 0 disables this feature. Select the ISAKMP identifier for this router. Choices are: • Local WAN IP • FQDN • User-FQDN • DER ASN1 DN Enter the appropriate value for the local identifier. If the Local or Remote Identifier is not an IP address, negotiation is only possible in aggressive mode. If FQDN, User FQDN or DER ASN1 DN is selected, the wireless controller disables main mode and sets the default setting to aggressive mode. Select the ISAKMP identifier for this router. Choices are: • Remote WAN IP • FQDN • User-FQDN • DER ASN1 DN Enter the appropriate value for the remote identifier. If the Local or Remote Identifier is not an IP address, negotiation is only possible in aggressive mode. If FQDN, User FQDN or DER ASN1 DN is selected, the wireless controller disables main mode and sets the default setting to aggressive mode. Check the algorithm used to negotiate the SA. Choices are: • DES = faster than 3DES, but less secure. • 3DES = triple DES. More secure method than DES, but with lower throughput. • Advanced Encryption Standard is a block cipher that can be used at 128, 192, or 256 bits. The higher the bit rate, the stronger the encryption but the trade-off is lower throughput. It is more secure than DES or 3DES. The following AES choices are supported: − AES-128 − AES-192 − AES-256 • BLOWFISH = a symmetric encryption algorithm that uses the same secret key to both encrypt and decrypt messages. Blowfish is also a block cipher that divides a message into fixed length blocks during encryption and decryption. Blowfish has a 64-bit block size and a key length of anywhere from 32 bits to 448 bits, and uses 16 rounds of main algorithm. • CAST128 = a 128-bit block cipher. CAST is a strong, military-grade encryption algorithm that has a solid reputation for its ability to withstand unauthorized access. Specify the authentication algorithm for the VPN header. Ensure that the same authentication algorithm is configured on both sides of the tunnel. Choices are: • MD5 = Message-Digest algorithm 5 (MD5). MD5 is less secure than SHA, but faster. • SHA-1 = Secure Hash Algorithm (SHA-1) hash function. SHA-1 uses a 160-bit encryption key and is stronger than MD5. • SHA2-256 = SHA-256 hash function that uses 32-bit words. • SHA2-384 = SHA-384 hash function. • SHA2-512 = SHA-512 hash function that uses 64-bit words. 99 DWC-1000 Wireless Controller User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

VPN Settings
99
DWC-1000 Wireless Controller User’s Guide
Field
Description
NAT Keep Alive Frequency
If NAT Traversal = On, use this option to control the keep-alive-frequency value. Keep-alive
packets are sent at the specified time interval and are used to keep the NAT mappings alive on
the NAT device. Setting this value to 0 disables this feature.
Local Identifier Type
Select the ISAKMP identifier for this router. Choices are:
Local WAN IP
FQDN
User-FQDN
DER ASN1 DN
Local Identifier
Enter the appropriate value for the local identifier.
If the Local or Remote Identifier is not an IP address, negotiation is only possible in aggressive
mode. If FQDN, User FQDN or DER ASN1 DN is selected, the wireless controller disables main
mode and sets the default setting to aggressive mode.
Remote Identifier Type
Select the ISAKMP identifier for this router. Choices are:
Remote WAN IP
FQDN
User-FQDN
DER ASN1 DN
Remote Identifier
Enter the appropriate value for the remote identifier.
If the Local or Remote Identifier is not an IP address, negotiation is only possible in aggressive
mode. If FQDN, User FQDN or DER ASN1 DN is selected, the wireless controller disables main
mode and sets the default setting to aggressive mode.
Encryption Algorithm
Check the algorithm used to negotiate the SA. Choices are:
DES = faster than 3DES, but less secure.
3DES = triple DES. More secure method than DES, but with lower throughput.
Advanced Encryption Standard is a block cipher that can be used at 128, 192, or 256 bits. The
higher the bit rate, the stronger the encryption but the trade-off is lower throughput. It is more
secure than DES or 3DES. The following AES choices are supported:
AES-128
AES-192
AES-256
BLOWFISH = a symmetric encryption algorithm that uses the same secret key to both encrypt
and decrypt messages. Blowfish is also a block cipher that divides a message into fixed length
blocks during encryption and decryption. Blowfish has a 64-bit block size and a key length of
anywhere from 32 bits to 448 bits, and uses 16 rounds of main algorithm.
CAST128 = a 128-bit block cipher. CAST is a strong, military-grade encryption algorithm that
has a solid reputation for its ability to withstand unauthorized access.
Authentication Algorithm
Specify the authentication algorithm for the VPN header. Ensure that the same authentication
algorithm is configured on both sides of the tunnel. Choices are:
MD5 = Message-Digest algorithm 5 (MD5). MD5 is less secure than SHA, but faster.
SHA-1 = Secure Hash Algorithm (SHA-1) hash function. SHA-1 uses a 160-bit encryption key
and is stronger than MD5.
SHA2-256 = SHA-256 hash function that uses 32-bit words.
SHA2-384 = SHA-384 hash function.
SHA2-512 = SHA-512 hash function that uses 64-bit words.