User manual
www.cooperbussmann.com/wirelessresources
Cooper Bussmann 615M-1 Cellular Data Modem and IP Router Series Manual
43Rev Version 1.0
Phase 1
Authentication
Use MD5 or SHA1 hashing.
Phase 1 DH Group Negotiate (Auto) or use 768 (Group 1), 1024 (Group 2), 1536 (Group 5) or 2048
(Group 14) bit keys.
Phase 1 Key Lifetime How long the keying channel of a connection should last before being renegotiated.
Phase 2 Encryption Use AES-128, AES-256 or 3DES encryption.
Phase 2
Authentication
Use MD5 or SHA1 hashing.
Phase 2 Lifetime The duration of a particular instance of a connection, from successful negotiation to
expiry.
Pre-shared Key Predetermined key known to both the local unit and the remote side prior to
establishing
the tunnel.
Negotiation Mode
Select “Normal” to allow IPsec to negotiate some connection parameters. Select “Aggressive” to require that only
those parameters selected above can be used to create the tunnel.
Perfect Forward
Secrecy
Enable Perfect Forward Secrecy for the session keys.
Dead Peer Detection
Delay
Tunnel keepalive time for R_U_THERE packets during idle periods.
Dead Peer Detection
Timeout
Timeout time during tunnel idle periods where no R_U_THERE_ACK has been
received.
Dead Peer Detection
Action
Action to be taken when timeout value is reached.
Add/Update Click the Add/Update to save the new entry.
Tunnel Table
Enable Click Enable to enable a tunnel. The tunnel’s state is saved across resets.
View Click View to open a page showing the log of the tunnel’s negotiation activity.
Delete Click Del to delete the tunnel.