Netgear DG834G DG834Gv4 Reference Manual - Page 90
The typical automated Internet Key Exchange IKE setup see
UPC - 606449029918
View all Netgear DG834G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 90 highlights
ADSL2+ Modem Wireless Router DG834G Reference Manual • Will either endpoint use fully qualified domain names (FQDNs)? FQDNs supplied by Dynamic DNS providers (see "Using a Fully Qualified Domain Name (FQDN)" on page B-7) can allow a VPN endpoint with a dynamic IP address to initiate or respond to a tunnel request. Otherwise, the side using a dynamic IP address must always be the initiator. • Which method will you use to configure your VPN tunnels? - The VPN Wizard using VPNC defaults (see Table 6-2) - The typical automated Internet Key Exchange (IKE) setup (see "Using Auto Policy to Configure VPN Tunnels" on page 6-32) - A manual keying setup in which you must specify each phase of the connection (see "Using Manual Policy to Configure VPN Tunnels" on page 6-41)? Table 6-2. Parameters Recommended by the VPNC and Used in the VPN Wizard Parameter Secure Association Authentication Method Encryption Method Authentication Protocol Diffie-Hellman (DH) Group Key Life IKE Life Time Factory Default Main Mode Pre-shared Key 3DES SHA-1 Group 2 (1024 bit) 8 hours 1 hour • What level of IPSec VPN encryption will you use? - DES. The Data Encryption Standard (DES) processes input data that is 64 bits wide, encrypting these values using a 56-bit key. Faster but less secure than 3DES. - 3DES. Triple DES achieves a higher level of security by encrypting the data three times using DES with three different, unrelated keys. • What level of authentication will you use? - MDS. 128 bits, faster but less secure. - SHA-1. 160 bits, slower but more secure. 6-4 Virtual Private Networking v2.0, September 2007