User`s guide
BaseWall, Tel: +31-74-2491004, Fax: +31-74-2593934
50
Security level
• Encryption Method – It specifies the encryption mechanism to use. Data encryption makes the data
unreadable if intercepted. There are three encryption method available; DES/3DES and AES. The
default is null.
• Authentication – It specifies the packets authentication mechanism to use. Packets authentication
proves that data comes from source you think it comes from. There are three authentications available.
MD5,
SHA1 and SHA2.
Key management
• Key – Key Type: there are two key types (manual key and auto key) available for the key
exchange management.
• Manual Key: If manual key is selected, no key negotiation is needed.
• AutoKey (IKE)- There are two types of operation modes can be used.
• Main mode accomplishes a phase one IKE exchange by establishing a secure channel.
• Aggressive Mode is another way of accomplishing a phase one exchange. It is faster and simpler
than main mode, but does not provide identity protection for the negotiating nodes.
• Perfect Forward Secrecy (PFS) – If PFS is enable, IKE phase 2 negotiation will generate new key
material for IP traffic encryption & authentication. Preshared Key – This field is to authenticate the
remote IKE peer.
• Key Lifetime- This is specified the lifetime of the IKE generated Key. If the time expires or data is
passed over this volumn, a new key will be renegotiated, By default, 0 is for no limit.