Specifications
Motorola Solutions AP-7131N-FGR Access Point Product Reference Guide
6-36
4. Click Ok to return to the VPN screen. Click Apply to retain the settings made on the IKE
Settings screen.
5. Click Cancel to return to the VPN screen without retaining the changes made to the IKE
Settings screen.
6.7.5 Viewing VPN Status
Use the VPN Status screen to display the status of the tunnels configured on the access point as
well as their lifetime, transmit and receive statistics. The VPN Status screen is read-only with no
configurable parameters. To configure a VPN tunnel, use the VPN configuration screen in the WAN
section of the access point menu tree.
IKE Authentication
Passphrase
If you selected Pre-Shared Key as the authentication mode, you
must provide a passphrase.
IKE Encryption
Algorithm
Select the encryption and authentication algorithms for the VPN
tunnel from the drop-down menu.
• AES 128-bit - Uses the Advanced Encryption Standard
algorithm with 128-bit. No keys are required to be manually
provided.
• AES 192-bit - Enables the Advanced Encryption Standard
algorithm with 192-bit. No keys are required to be manually
provided.
• AES 256-bit - Uses the Advanced Encryption Standard
algorithm with 256-bit. No keys are required to be manually
provided.
Key Lifetime The number of seconds the key is valid. At the end of the lifetime,
the key is renegotiated.
This is an IPsec Phase 1 SA lifetime has the default value of 3600
seconds. User can configure this lifetime from 300 - 86400 seconds
The access point forces renegotiation every configured lifetime
seconds.
Diffie Hellman Group Select a Diffie-Hellman Group to use. The Diffie-Hellman key
agreement protocol allows two users to exchange a secret key over
an insecure medium without any prior secrets. Only Group 14- 2048
bit is supported.