Vpn tunnel configuration, Vpn tunnel configuration -4, Summarize – NETGEAR 54 Mbps Wireless ADSL Firewall DG834G User Manual

Page 98

Advertising
background image

Wireless ADSL2+ Modem Router DG834G User Manual

6-4

Virtual Private Networking

v1.0, May 2008

Will either endpoint use fully qualified domain names (FQDNs)? FQDNs supplied by
Dynamic DNS providers (see

“Using a Fully Qualified Domain Name (FQDN)” on page B-7

)

can allow a VPN endpoint with a dynamic IP address to initiate or respond to a tunnel request.
Otherwise, the side using a dynamic IP address must always be the initiator.

Which method will you use to configure your VPN tunnels?

The VPN Wizard using VPNC defaults (see

Table 6-2

)

The typical automated Internet Key Exchange (IKE) setup (see

“Using Auto Policy to

Configure VPN Tunnels” on page 6-32

)

A manual keying setup in which you must specify each phase of the connection (see

“Using Manual Policy to Configure VPN Tunnels” on page 6-42

)?

What level of IPSec VPN encryption will you use?

DES. The Data Encryption Standard (DES) processes input data that is 64 bits wide,
encrypting these values using a 56-bit key. Faster but less secure than 3DES.

3DES. Triple DES achieves a higher level of security by encrypting the data three times
using DES with three different, unrelated keys.

What level of authentication will you use?

MDS. 128 bits, faster but less secure.

SHA-1. 160 bits, slower but more secure.

VPN Tunnel Configuration

There are two tunnel configurations and three ways to configure them:

Table 6-2. Parameters Recommended by the VPNC and Used in the VPN Wizard

Parameter

Factory Default

Secure Association

Main Mode

Authentication Method

Pre-shared Key

Encryption Method

3DES

Authentication Protocol

SHA-1

Diffie-Hellman (DH) Group

Group 2 (1024 bit)

Key Life

8 hours

IKE Life Time

1 hour

Advertising