NETGEAR UTM50-100NAS Network Hardware User Manual


 
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Virtual Private Networking Using IPsec Connections 7-37
v1.0, January 2010
Integrity Algorithm From the pull-down menu, select one of the following two algorithms to be
used in the VPN header for the authentication process:
SHA-1. Hash algorithm that produces a 160-bit digest. This is the default
setting.
MD5. Hash algorithm that produces a 128-bit digest.
Key-In The integrity key for the inbound policy. The length of the key depends on
the selected integrity algorithm:
MD5: enter 16 characters.
SHA-1: enter 20 characters.
Key-Out The integrity key for he outbound policy. The length of the key depends on
the selected integrity algorithm. The required key lengths are the same as
for the Key-In (se above).
Auto Policy Parameters
Note: These fields apply only when you select Auto Policy as the policy type.
SA Lifetime The lifetime of the Security Association (SA) is the period or the amount of
transmitted data after which the SA becomes invalid and must be
renegotiated. From the pull-down menu, select how the SA lifetime is
specified:
Seconds. In the SA Lifetime field, enter a period in seconds. The minimum
value is 300 seconds. The default value is 3600 seconds.
KBytes. In the SA Lifetime field, enter a number of kilobytes. The
minimum value is 1920000 KB.
Encryption Algorithm From the pull-down menu, select one of the following five algorithms to
negotiate the security association (SA):
DES. Data Encryption Standard (DES)
3DES. Triple DES. This is the default algorithm.
AES-128. Advanced Encryption Standard (AES) with a 128-bits key size.
AES-192. AES with a 192-bits key size.
AES-256. AES with a 256-bits key size.
Integrity Algorithm From the pull-down menu, select one of the following two algorithms to be
used in the VPN header for the authentication process:
SHA-1. Hash algorithm that produces a 160-bit digest. This is the default
setting.
MD5. Hash algorithm that produces a 128-bit digest.
Table 7-12. Add VPN Policy Settings (continued)
Item Description (or Subfield and Description)