Linksys QuickVPN Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN A - Page 122

Viewing Connection Status, Encryption, Authentication, Perfect Forward Secrecy, Preshared Key

Page 122 highlights

Setting Up and Configuring the WRVS4400N Wireless-N Router Configuring the VPN Settings 5 • Encryption- The Encryption method determines the length of the key used to encrypt/decrypt ESP packets. 3DES is supported. Notice that both sides of the VPN tunnel must use the same Encryption method. • Authentication- Authentication determines a method to authenticate the ESP packets. Either MD5 or SHA1 may be selected. Notice that both sides (VPN endpoints) must use the same Authentication method. - MD5- A one way hashing algorithm that produces a 128-bit digest. - SHA1- A one way hashing algorithm that produces a 160-bit digest. • Perfect Forward Secrecy- If PFS is enabled, IKE Phase 2 negotiation generates a new key material for IP traffic encryption and authentication. Note: that both sides must have this selected. • Preshared Key- This field specifies a key used to authenticate IP traffic. Both character and hexadecimal value are acceptable in this field. Note: that both sides must use the same Authentication Key. • Inbound SPI/Outbound SPI-The SPI (Security Parameter Index) is carried in the ESP header. This enables the receiver to select the SA, under which a packet should be processed. The SPI is a 32-bit value. Both decimal and hexadecimal values are acceptable. for example, "987654321" or "0x3ade68b1". Each tunnel must have unique an Inbound SPI and Outbound SPI. No two tunnels share the same SPI. Notice that Inbound SPI must match the other router's Outbound SPI, and vice versa Viewing Connection Status The Status section of the VPN > IPSec VPN window shows the connection status for the selected tunnel. The state is either connected or disconnected. STEP 3 Click Save. Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide 122

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233

Setting Up and Configuring the WRVS4400N Wireless-N Router
Configuring the VPN Settings
Cisco WRVS4400N Wireless-N Gigabit Security Router with VPN Administration Guide
122
5
Encryption
— The Encryption method determines the length of the key used
to encrypt/decrypt ESP packets. 3DES is supported. Notice that both sides
of the VPN tunnel must use the same Encryption method.
Authentication
— Authentication determines a method to authenticate the
ESP packets. Either MD5 or SHA1 may be selected. Notice that both sides
(VPN endpoints) must use the same Authentication method.
-
MD5— A one way hashing algorithm that produces a 128-bit digest.
-
SHA1— A one way hashing algorithm that produces a 160-bit digest.
Perfect Forward Secrecy
— If PFS is enabled, IKE Phase 2 negotiation
generates a new key material for IP traffic encryption and authentication.
Note: that both sides must have this selected.
Preshared Key
— This field specifies a key used to authenticate IP traffic.
Both character and hexadecimal value are acceptable in this field. Note: that
both sides must use the same Authentication Key.
Inbound SPI/Outbound SPI
—The SPI (Security Parameter Index) is carried
in the ESP header. This enables the receiver to select the SA, under which a
packet should be processed. The SPI is a 32-bit value. Both decimal and
hexadecimal values are acceptable. for example, “987654321” or
“0x3ade68b1”. Each tunnel must have unique an Inbound SPI and Outbound
SPI. No two tunnels share the same SPI. Notice that Inbound SPI must match
the other router's Outbound SPI, and vice versa
Viewing Connection Status
The Status section of the VPN > IPSec VPN window shows the connection status
for the selected tunnel. The state is either connected or disconnected.
STEP 3
Click
Save
.