Amer-networks E5Web GUI Manual de usuario Pagina 586

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 777
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 585
It is specified in time (seconds) as well as data amount
(kilobytes). Whenever one of these expires, a new phase-1
exchange will be performed. If no data was transmitted in
the last "incarnation" of the IKE connection, no new
connection will be made until someone wants to use the
VPN connection again. This value must be set greater than
the IPsec SA lifetime.
PFS With Perfect Forwarding Secrecy (PFS) disabled, initial keying
material is "created" during the key exchange in phase-1 of
the IKE negotiation. In phase-2 of the IKE negotiation,
encryption and authentication session keys will be
extracted from this initial keying material. By using PFS,
completely new keying material will always be created
upon re-key. Should one key be compromised, no other key
can be derived using that information.
PFS can be used in two modes: the first is PFS on keys,
where a new key exchange will be performed in every
phase-2 negotiation. The other type is PFS on identities,
where the identities are also protected, by deleting the
phase-1 SA every time a phase-2 negotiation has been
finished, making sure no more than one phase-2
negotiation is encrypted using the same key.
PFS is generally not needed, since it is very unlikely that any
encryption or authentication keys will be compromised.
PFS DH Group This specifies the Diffie-Hellman group to use with PFS. The
available DH groups are discussed below.
IPsec DH Group This specifies the Diffie-Hellman group to use for IPsec
communication. The available DH groups are discussed
below in the section titled Diffie-Hellman Groups.
IPsec Encryption The encryption algorithm that will be used on the
protected IPsec traffic.
This is not needed when AH is used, or when ESP is used
without encryption.
The algorithms supported by Clavister Security Gateway
VPNs are:
AES
Blowfish
Twofish
Cast128
3DES
DES
IPsec Authentication This specifies the authentication algorithm used on the
protected traffic.
This is not used when ESP is used without authentication,
although it is not recommended to use ESP without
Chapter 9: VPN
586
Vista de pagina 585
1 2 ... 581 582 583 584 585 586 587 588 589 590 591 ... 776 777

Comentarios a estos manuales

Sin comentarios