Chapter 10 - configuring vpn – Asus SL1200 User Manual

Page 121

Advertising
background image

104

Chapter 10 - Configuring VPN

ASUS SL1200

Pre-configured IKE proposals
IKE proposals decide the type of encryption, hash algorithms, and

authentication method that will be used for the establishment of the

session keys between the endpoints of a tunnel. Table 10.2 lists the pre-

configured IKE proposals.

Table 10.2. Pre-Configured IKE proposals in the router

Name

Encryption
Algorithm

Authentication
Algorithm

D i f f i e - H e l l m a n
Group

Key Manage-
ment

Lifetime

(secs)

ike-

preshared-

3des-sha1-

dh2

3DES

SHA-1

2

Pre-shared

Keys

3600

ike-

preshared-

3des-md5-

dh2

3DES

MD5

2

Pre-shared

Keys

3600

ike-pre-

shareddes-

sha1-dh2

DES

SHA-1

2

Pre-shared

Keys

3600

ike-pre-

shareddes-

md5-dh2

DES

MD5

2

Pre-shared

Keys

3600

ike-

preshared-

3des-sha1-

dh1

3DES

SHA-1

1

Pre-shared

Keys

3600

ike-

preshared-

3des-md5-

dh1

3DES

MD5

1

Pre-shared

Keys

3600

1

ike-pre-

shareddes-

sha1-dh1

DES

SHA-1

1

Pre-shared

Keys

3600

i k e - p r e -

shareddes-

md5-dh1

DES

MD5

1

Pre-shared

Keys

3600

ike-

preshared-

3des-sha1-

dh5

3DES

SHA-1

5

Pre-shared

Keys

3600

Advertising