PLANET CS-1000 User Manual
Page 97

Multi-Homing Security Gateway User’s Manual
WAN interface:
Select WAN 1 or WAN 2 to be the WAN port of VPN connection.
To Destination:
Remote Gateway – Fixed IP or Domain Name: Specify the fixed IP address or domain name of the
remote side VPN gateway.
Remote Gateway or Client – Dynamic IP: Select Remote Gateway or Client if there is only one user
or device in remote site and dials up to Internet with PPPoE or cable
modem.
Preshared Key:
The IKE VPN must be defined with a Preshared Key.
Encapsulation
ISAKMP Algorithm
ENC Algorithm:
ESP (Encapsulating Security Payload) provides security for the payload (data)
sent through the VPN tunnel. Generally, you will want to enable both Encryption and Authentication.
The available encryption algorithms including: 56 bit DES-CBC, 168-bit 3DES-CBC, AES 128-bit,
AES 192-bit or AES 256-bit encryption algorithm. The default algorithm 56 bit DES-CBC.
AUTH Method:
Authentication Method. Selects MD5 (128-bit hash) or SHA-1 (160-bit hash)
authentication algorithm. In general, SHA-1 is more secured than MD5. The default algorithm is MD5.
Group: Selects Group 1 (768-bit modulus), Group 2 (1024-bit modulus) or Group 5 (1536-bit
modulus). The larger the modulus, the more secure the generated key is. However, the larger the
modulus, the longer the key generation process takes. Both side of VPN tunnels must agree to
use the same group. The default algorithm is Group 1.
IPSec Algorithm:
Select Data Encryption + Authentication or Authentication Only.
Data Encryption + Authentication
Encryption Algorithm:
Selects 56 bit DES-CBC, 168-bit 3DES-CBC, AES 128-bit, AES 192-bit or
AES 256-bit encryption algorithm. The default algorithm is 56 bit DES-CBC.
Authentication Algorithm:
Selects MD5 (128-bit hash) or SHA-1 (160-bit hash) authentication
algorithm. In general, SHA-1 is more secured than MD5. The default algorithm is MD5.
Authentication Only:
Select this function the IPSec Algorithm will only be anthenticated with preshared
key.
Step 3:
Configure Optional Item paremeters if necessary.
Perfect Forward Secrecy: Select Group 1, Group 2 or Group 5 to enhances security by changing the
IPsec key at regular intervals, and ensuring that each key has no relationship to the previous key. The
default is NO-PFS.
ISAKMP Lifetime: New keys will be generated whenever the lifetime of the old keys is exceeded. The
Administrator may enable this feature if needed and enter the lifetime in seconds to re-key. The default is
3600 seconds (one hours). Selection of small values could lead to frequent re-keying, which could affect
performance.
- 91 -