WS 2000 Wireless Switch System Reference Guide4-12
3. If RIP v2 or RIP v2 (v1 compat) is the selected RIP type, the RIP v2 Authentication area of the screen becomes
active. Select the type of authentication to use from the Authentication Type drop-down menu. Available options are:
4. If the Simple authentication method is selected, specify a password of up to 15 alphanumeric characters in the
Password (Simple Authentication) field.
5. If the MD5 authentication method is selected, fill in the Key #1 and Key #2 fields. Type in any numeric value between
0 and 256 into the MD5 ID field. Type in any string consisting of 16 alphanumeric characters into the MD5 Auth Key
field.
6. Click the Ok button to return to the Routing screen.
Configuring a Virtual Private Network (VPN)
VPNs are IP-based networks that use encryption and tunneling to give users remote access to a secure LAN. In essence, the
trust relationship is extended from one LAN across the public network to another LAN, without sacrificing security. A VPN
behaves similarly to a private network; however, because the data travels through the public network, three types of security
mechanisms are required: confidentiality, integrity, and authentication.
• Confidentiality (through public-key or secret-key cryptology) ensures the privacy of information being exchanged
between communicating parties.
• Integrity ensures that information being transmitted over the public Internet is not altered in any way during transit (by
using hash codes, message authentication codes, or digital signatures).
• Authentication (with password authentication or digital signatures) ensures the identity of all communicating parties.
A diagram of a typical VPN situation is shown below, where there is a VPN tunnel created between two WS 2000 switches
across the WAN. The diagram shows the settings for both switches.
None This option disables the RIP authentication.
Simple This option enable RIP version 2’s simple authentication mechanism.
This setting activates the Password (Simple Authentication) field.
MD5 This option enables the MD5 algorithm for data verification. MD5 takes as input a message of arbi-
trary length and produces a 128-bit fingerprint. The MD5 algorithm is intended for digital signature
applications, in which a large file must be compressed in a secure manner before being encrypted
with a private (secret) key under a public-key cryptographic system. The MD5 setting activates the
RIP v2 Authentication settings for keys (below).