Netgear FVS318 FVS318 Reference Manual - Page 69

Configuring a SA Using IKE Main Mode, IKE - VPN Settings Main Mode Configuration Menu - throughput

Page 69 highlights

Reference Manual for the Model FVS318 Broadband ProSafe VPN Firewall Configuring a SA Using IKE Main Mode The most common configuration scenarios will use IKE to manage the authentication and encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to automatically generate required parameters. The IKE Main Mode settings are introduced below. The IKE Aggressive Mode settings are introduced in the section after this one. Click the VPN Settings link of the Setup section of the main menu, click the radio button of a VPN tunnel, and then click the Edit button display the Main Mode menu shown in Figure 6-3. Figure 6-3: IKE - VPN Settings Main Mode Configuration Menu The Security Association IKE Main Mode configuration fields are defined in the following table. Table 6-1. Security Association Main Mode Configuration Fields Field Description Secure Association Choose Main Mode key exchange mode for this VPN tunnel: • IKE Main Mode -- the default. • IKE Aggressive Mode -- faster but less secure. • Manual Keys -- more control but more complex. Perfect Forward Secrecy Perfect Forward Secrecy provides additional security by means of a shared secret value. If one key is compromised, previous and subsequent keys are secure because they are not derived from previous keys. Encryption Protocol The level of encryption. Longer keys are more secure but throughput may slow. • Null - Fastest but no security. • DES - The Data Encryption Standard (DES) processes input data that is 64 bits wide, encrypting these values using a 56 bit key. Faster but less secure than 3DES or AES. • 3DES - (Triple DES) achieves a higher level of security by encrypting the data three times using DES with three different, unrelated keys. • AES - 128, - 192, or - 256. Advanced Encryption Standard. Most secure. Virtual Private Networking 6-5 M-10146-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222

Reference Manual for the Model FVS318 Broadband
ProSafe VPN Firewall
Virtual Private Networking
6-5
M-10146-01
Configuring a SA Using IKE Main Mode
The most common configuration scenarios will use IKE to manage the authentication and
encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to
automatically generate required parameters. The IKE Main Mode settings are introduced below.
The IKE Aggressive Mode settings are introduced in the section after this one.
Click the VPN Settings link of the Setup section of the main menu, click the radio button of a VPN
tunnel, and then click the Edit button display the Main Mode menu shown in
Figure 6-3
.
Figure 6-3: IKE - VPN Settings Main Mode Configuration Menu
The Security Association IKE Main Mode configuration fields are defined in the following table.
Table 6-1.
Security Association Main Mode Configuration Fields
Field
Description
Secure Association
Choose Main Mode key exchange mode for this VPN tunnel:
IKE Main Mode -- the default.
IKE Aggressive Mode -- faster but less secure.
Manual Keys -- more control but more complex.
Perfect Forward Secrecy
Perfect Forward Secrecy provides additional security by means of a shared
secret value. If one key is compromised, previous and subsequent keys are
secure because they are not derived from previous keys.
Encryption Protocol
The level of encryption. Longer keys are more secure but throughput may slow.
Null - Fastest but no security.
DES - The Data Encryption Standard (DES) processes input data that is 64
bits wide, encrypting these values using a 56 bit key. Faster but less secure
than 3DES or AES.
3DES - (Triple DES) achieves a higher level of security by encrypting the data
three times using DES with three different, unrelated keys.
AES - 128, - 192, or - 256. Advanced Encryption Standard. Most secure.