Cisco VPN 3000 User's Guide Page 131

  • Download
  • Add to my manuals
  • Print
  • Page
    / 502
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 130
Configuration | System | Tunneling Protocols | IPSec
7-7
VPN 3000 Concentrator Series User Guide
Hello Interval
Enter the time in seconds to wait when the L2TP tunnel is idle (no control or payload packets received)
before sending a Hello (or keep-alive) packet to the remote client. Minimum is
1, maximum is 3600,
and default is
60 seconds.
Apply / Cancel
To apply your L2TP settings and to include them in the active configuration, click Apply. The Manager
returns to the
Configuration | System | Tunneling Protocols screen.
Reminder: To save the active configuration and make it the boot configuration, click the
Save Needed icon at the
top of the Manager window.
To discard your settings, click
Cancel. The Manager returns to the Configuration | System | Tunneling
Protocols
screen.
Configuration | System | Tunneling Protocols | IPSec
This section of the Manager lets you configure IPSec LAN-to-LAN connections, and IKE (Internet Key
Exchange) parameters for IPSec Security Associations and LAN-to-LAN connections.
IPSec provides the most complete architecture for VPN tunnels, and it is perceived as the most secure
protocol. Both LAN-to-LAN connections and client-to-LAN connections can use IPSec.
In IPSec terminology, a peer is a remote-access client or another secure gateway. During tunnel
establishment under IPSec, the two peers negotiate Security Associations that govern authentication,
encryption, encapsulation, key management, etc. These negotiations involve two phases: first, to
establish the tunnel (the IKE SA); and second, to govern traffic within the tunnel (the IPSec SA).
In IPSec LAN-to-LAN connections, the VPN Concentrator can function as initiator or responder. In
IPSec client-to-LAN connections, the VPN Concentrator functions only as responder. Initiators propose
SAs; responders accept, reject, or make counter-proposalsall according to configured SA parameters.
To establish a connection, both entities must agree on the SAs.
The Cisco VPN 3000 Client complies with the IPSec protocol and is specifically designed to work with
the VPN Concentrator. However, the VPN Concentrator can establish IPSec connections with many
protocol-compliant clients. Likewise, the VPN Concentrator can establish LAN-to-LAN connections
with other protocol-compliant VPN devices (often called secure gateways).
The Cisco VPN 3000 Client supports these IPSec attributes:
Aggressive Negotiation Mode
Authentication Algorithms:
ESP-MD5-HMAC-128
ESP-SHA1-HMAC-160
Authentication Modes:
Preshared Keys
X.509 Digital Certificates
Diffie-Hellman Group 1
Encryption Algorithms:
DES-56
3DES-168
Page view 130
1 2 ... 126 127 128 129 130 131 132 133 134 135 136 ... 501 502

Comments to this Manuals

No comments