Netgear DGND3300v2 User Manual - Page 79

VPN Tunnel Configuration, Table 2., Parameters Recommended by the VPNC and Used in the VPN Wizard

Page 79 highlights

N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual - The typical automated Internet Key Exchange (IKE) setup (see Using Auto Policy to Configure VPN Tunnels on page 101) - A manual keying setup in which you must specify each phase of the connection (see Using Manual Policy to Configure VPN Tunnels on page 109) Table 2. Parameters Recommended by the VPNC and Used in the VPN Wizard Parameter Secure Association Authentication Method Encryption Method Authentication Protocol Diffie-Hellman (DH) Group Key Life IKE Life Time Factory Default Setting Main Mode Pre-Shared Key 3DES SHA-1 Group 2 (1024 bit) 8 hours 1 hour • What level of IPSec VPN encryption will you use? - DES. The Data Encryption Standard (DES) processes input data that is 64 bits wide, encrypting these values using a 56-bit key. Faster but less secure than 3DES. - 3DES. Triple DES achieves a higher level of security by encrypting the data three times using DES with three different, unrelated keys. • What level of authentication will you use? - MDS. 128 bits, faster but less secure. - SHA-1. 160 bits, slower but more secure. VPN Tunnel Configuration There are two tunnel configurations and three ways to configure them: • Use the VPN Wizard to configure a VPN tunnel (recommended for most situations): - See Setting Up a Client-to-Gateway VPN Configuration on page 80. - See Setting Up a Gateway-to-Gateway VPN Configuration on page 90. • See Using Auto Policy to Configure VPN Tunnels on page 101 when the VPN Wizard and its VPNC defaults (see Table 2 on page 79) are not appropriate for your special circumstances, but you want to automate the Internet Key Exchange (IKE) setup. • See Using Manual Policy to Configure VPN Tunnels on page 109 when the VPN Wizard and its VPNC defaults (see Table 2 on page 79) are not appropriate for your special circumstances and you must specify each phase of the connection. You manually enter all the authentication and key parameters. You have more control over the process; however, the process is more complex, and there are more opportunities for errors or Chapter 6. Virtual Private Networking | 79

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177

Chapter 6.
Virtual Private Networking
|
79
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2 User Manual
-
The typical automated Internet Key Exchange (IKE) setup (see
Using Auto Policy to
Configure VPN Tunnels
on page
101)
-
A manual keying setup in which you must specify each phase of the connection (see
Using Manual Policy to Configure VPN Tunnels
on page
109)
What level of IPSec VPN encryption will you use?
-
DES
. The Data Encryption Standard (DES) processes input data that is 64 bits wide,
encrypting these values using a 56-bit key. Faster but less secure than 3DES.
-
3DES
. Triple DES achieves a higher level of security by encrypting the data three
times using DES with three different, unrelated keys.
What level of authentication will you use?
-
MDS
. 128 bits, faster but less secure.
-
SHA-1
. 160 bits, slower but more secure.
VPN Tunnel Configuration
There are two tunnel configurations and three ways to configure them:
Use the VPN Wizard to configure a VPN tunnel (recommended for most situations):
-
See
Setting Up a Client-to-Gateway VPN Configuration
on page
80.
-
See
Setting Up a Gateway-to-Gateway VPN Configuration
on page
90.
See
Using Auto Policy to Configure VPN Tunnels
on page
101 when the VPN Wizard and
its VPNC defaults (see
Table
2
on page
79) are not appropriate for your special
circumstances, but you want to automate the Internet Key Exchange (IKE) setup.
See
Using Manual Policy to Configure VPN Tunnels
on page
109 when the VPN Wizard
and its VPNC defaults (see
Table
2
on page
79) are not appropriate for your special
circumstances and you must specify each phase of the connection. You manually enter
all the authentication and key parameters. You have more control over the process;
however, the process is more complex, and there are more opportunities for errors or
Table 2.
Parameters Recommended by the VPNC and Used in the VPN Wizard
Parameter
Factory Default Setting
Secure Association
Main Mode
Authentication Method
Pre-Shared Key
Encryption Method
3DES
Authentication Protocol
SHA-1
Diffie-Hellman (DH) Group
Group 2 (1024 bit)
Key Life
8 hours
IKE Life Time
1 hour