Netgear DGND3300 [79/174] Vpn tunnel configuration

Netgear DGND3300 [79/174] Vpn tunnel configuration
Virtual Private Networking
79
N300 Wireless Dual Band ADSL2+ Modem Router DGND3300v2
can allow a VPN endpoint with a dynamic IP address to initiate or respond to a tunnel
request. Otherwise, the side using a dynamic IP address has to always be the initiator.
Which method will
you use to configure your VPN tunnels?
- The VPN Wizard using VPNC defaults (see Ta
ble 2, Parameters Recommended by
the BPNC and Used in the VPN Wizard on page 79
).
- The typical automated Internet Key Exchange (IKE) setup (see Use Auto Policy to
Con
figure VPN Tunnels on page 101
).
- A manual keyin
g setup in which you need to specify each phase of the connection
(see Use Manual Policy to Configure VPN Tunnels on pag
e 107)?
Table 2. Parameters Recommended by the BPNC and Used in the VPN Wizard
Parameter Factory Default Setting
Secure Association Main Mode
Authentication Method Pre-Shared Key
Encryption Method 3DES
Authentication Protocol SHA-1
Diffie-Hellman (DH) Group Group 2 (1024 bit)
Key Life 8 hours
IKE Life Time 1 hour
What level of IPSec VPN encryption will you use?
- DES. The
Data Encryption Standard (DES) processes input data that is 64 bits wide,
encrypting these values using a 56-bit key. Faster but less secure than 3DES.
- 3DES. Triple DES ach
ieves a higher level of security by encrypting the data three
times using DES with three different, unrelated keys.
What level of authen
tication will you use?
- MDS. 128 b
its, faster but less secure.
- SHA-1. 160 bits, slower but more secure.
VPN Tunnel Configuration
There are two tunnel configurations and three ways to configure them:
Use the VPN Wizard to configure a VPN tunnel (recommended for most situations):
- See Set Up a Client-to
-Gateway VPN Configuration on pag
e 80.
- See Set Up a Gateway-to-Gateway VPN Configuration on p
age 90.
See Use Auto Policy to Configure VPN Tunnels on p
age 101 when the VPN Wizard and
its VPNC defaults are not appropriate for your special circumstances, but you want to
automate the
Internet Key Exchange (IKE) setup.

Содержание

Скачать