Symbol Technologies AP-5131 User Manual

Page 233

Advertising
background image

Configuring Access Point Security

6-47

IKE Authentication
Algorithm

IKE provides data authentication and anti-replay services for the
VPN tunnel. Select an authentication methods from the drop-down
menu.

MD5 - Enables the Message Digest 5 algorithm. No keys are

required to be manually provided.

SHA1 - Enables Secure Hash Algorithm. No keys are

required to be manually provided.

IKE Authentication
Passphrase

If you selected

Pre-Shared Key

as the authentication mode, you

must provide a passphrase.

IKE Encryption
Algorithm

Select the encryption and authentication algorithms for the VPN
tunnel from the drop-down menu.

DES - Uses the DES encryption algorithm. No keys are
required to be manually provided.

3DES - Enables the 3DES encryption algorithm. No keys are
required to be manually provided.

AES 128-bit - Uses the Advanced Encryption Standard
algorithm with 128-bit. No keys are required to be manually
provided.

AES 192-bit - Enables the Advanced Encryption Standard
algorithm with 192-bit. No keys are required to be manually
provided.

AES 256-bit - Uses the Advanced Encryption Standard
algorithm with 256-bit. No keys are required to be manually
provided.

Key Lifetime

The number of seconds the key is valid. At the end of the lifetime,
the key is renegotiated.
The

AP-5131

forces renegotiation every 3600 seconds. There is no

way to change the renegotiation value. If the IKE Lifetime is greater
than 3600, the keys still get renegotiated every 3600 seconds.

Advertising