Technical information

Network Security White Paper ver. G.1.2
Page 33 of 72
Encryption:
Clear Text (No encryption)
DES
3DES
AES-128
AES-192
AES-256
Authentication:
HMAC-MD5-96
HMAC-SHA1-96
The encryption or authentication keys can be set manually or generated automatically using IKE.
NOTE: IPsec are disabled for DHCP, DNS, WINS, and HTTPS by default. IPsec can be applied to these
protocols by enabling it in mshell.
2-2-2 Recommended Precautions
The suggested precautions are as follows.
Key Exchange:
Use IKE instead of the manual key exchange. If the encryption or authentication keys have to be set
manually, there will be no re-keying. The same keys will be used until manually changed again.
Security Protocol:
Scenario 1
Basic: AH
No encryption.
Selectable authentication algorithm.
Scenario 2
Standard: ESP
Payload is encrypted.
Selectable authentication algorithm.