Quick Reference Guide

ADSL2+ Modem Wireless Router DG834G Reference Manual
6-4 Virtual Private Networking
v2.0, September 2007
Will either endpoint use fully qualified domain names (FQDNs)? FQDNs supplied by
Dynamic DNS providers (see “Using a Fully Qualified Domain Name (FQDN)” on page B-7)
can allow a VPN endpoint with a dynamic IP address to initiate or respond to a tunnel request.
Otherwise, the side using a dynamic IP address must always be the initiator.
Which method will you use to configure your VPN tunnels?
The VPN Wizard using VPNC defaults (see Table 6-2)
The typical automated Internet Key Exchange (IKE) setup (see “Using Auto Policy to
Configure VPN Tunnels” on page 6-32)
A manual keying setup in which you must specify each phase of the connection (see
“Using Manual Policy to Configure VPN Tunnels” on page 6-41)?
What level of IPSec VPN encryption will you use?
DES. The Data Encryption Standard (DES) processes input data that is 64 bits wide,
encrypting these values using a 56-bit key. Faster but less secure than 3DES.
3DES. Triple DES achieves a higher level of security by encrypting the data three times
using DES with three different, unrelated keys.
What level of authentication will you use?
MDS. 128 bits, faster but less secure.
SHA-1. 160 bits, slower but more secure.
Table 6-2. Parameters Recommended by the VPNC and Used in the VPN Wizard
Parameter Factory Default
Secure Association Main Mode
Authentication Method Pre-shared Key
Encryption Method 3DES
Authentication Protocol SHA-1
Diffie-Hellman (DH) Group Group 2 (1024 bit)
Key Life 8 hours
IKE Life Time 1 hour