D-Link DFL-1000 [75/168] Select sha1 to propose to use sha1 authentication

D-Link DFL-1000 [75/168] Select sha1 to propose to use sha1 authentication
DFL-1000 User Manual
7
5
Aggressive mode with a user group selected
In this configuration, the server and the clients use aggressive mode for key exchange. A user group is
selected in the server dialup remote gateway. The format of the authentication key depends on the
information in the Local ID field.
Aggressive mode with a user group selected
Field Server
Client
configuration 1
Client
configuration 2
Client configuration 3
User Group
Select a user
group
N/A N/A N/A
Mode
Aggressive Aggressive Aggressive Aggressive
Authentication
Key
Server
authentication key
Server
authentication key
Server
authentication key
Client's password. This password must
be added to the server user database.
Local ID
Empty Client IP address
Client domain
name
Other information in a different format.
About DH groups
The Diffie-Hellman (DH) algorithm creates a shared secret key that can be created at both ends of the
VPN tunnel without communicating the key across the Internet.
You can select from DH group 1, 2, and 5. DH group 5 produces the most secure shared secret key and
DH group 1 produces the least secure key. However, DH group 1 is faster that DH group 5.
About the P1 proposal
AutoIKE key IPSec VPNs use a two-phase process for creating a VPN tunnel. During the first phase (P1),
the VPN gateways at each end of the tunnel negotiate to select a common algorithm for encryption and
another one for authentication. When you configure the remote gateway P1 proposal, you are selecting
the algorithms that the DFL-1000 NPG proposes during phase 1 negotiation. You can select up to three
different encryption and authentication algorithm combinations. Choosing more combinations might make
it easier for P1 negotiation, but you can restrict the choice to one if required. For negotiation to be
successful, both ends of the VPN tunnel must have at least one encryption algorithm and one
authentication algorithm in common.
Select DES to propose to encrypt packets using DES encryption.
Select 3DES to propose to encrypt packets using triple-DES encryption.
Select MD5 to propose to use MD5 authentication.
Select SHA1 to propose to use SHA1 authentication.
About NAT traversal
NAT (Network Address Translation) converts private IP addresses into routable public IP addresses. The
DFL-1000 NPG uses NAPT (Network Address Port Translation), in which both IP addresses and ports are
mapped. Mapping both components allows multiple private IP addresses to use a single public IP
address.
Because a NAT device modifies the original IP address of an IPSec packet, the packet fails an integrity
check. This failure means that IPSec VPN does not work with NAT devices.
NAT traversal solves this problem by encapsulating the IPSec packet within a UDP packet. Encapsulating
the IPSec packet allows NAT to process the packet without changing the original IPSec packet.

Содержание

Скачать