Ursalink UR51 Industrial Cellular Router User Guide
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>UR51</strong> <strong>User</strong> <strong>Guide</strong><br />
Local IP address<br />
GRE Hub IP Address<br />
GRE Local IP Address<br />
GRE Netmask<br />
GRE Key<br />
Negotiation Mode<br />
Authentication<br />
Algorithm<br />
Encryption Algorithm<br />
DH Group<br />
Key<br />
Local ID Type<br />
DMVPN local tunnel IP address.<br />
GRE Hub tunnel IP address.<br />
GRE local tunnel IP address.<br />
GRE local tunnel netmask.<br />
GRE tunnel key.<br />
Select from "Main" and "Aggressive".<br />
Select from "DES", "3DES", "AES128", "AES192" and "AES256".<br />
Select from "MD5" and "SHA1".<br />
Select from "MODP768_1", "MODP1024_2" and<br />
"MODP1536_5".<br />
Enter the preshared key.<br />
Select from "Default", "ID", "FQDN", and "<strong>User</strong> FQDN"<br />
IKE Life Time (s) Set the lifetime in IKE negotiation. Range: 60-86400.<br />
SA Algorithm<br />
PFS Group<br />
Select from "DES_MD5", "DES_SHA1", "3DES_MD5",<br />
"3DES_SHA1", "AES128_MD5", "AES128_SHA1",<br />
"AES192_MD5", "AES192_SHA1", "AES256_MD5" and<br />
"AES256_SHA1".<br />
Select from "NULL", "MODP768_1", "MODP1024_2" and<br />
"MODP1536-5".<br />
Life Time (s) Set the lifetime of IPsec SA. Range: 60-86400.<br />
DPD Interval Time (s)<br />
DPD Timeout (s)<br />
Cisco Secret<br />
NHRP Holdtime (s)<br />
Set DPD interval time<br />
Set DPD timeout.<br />
Cisco Nhrp key.<br />
The holdtime of Nhrp protocol.<br />
Table 4-2-8-1 DMVPN Parameters<br />
4.2.8.2 IPSec<br />
IPsec is especially useful for implementing virtual private networks and for remote user<br />
access through dial-up connection to private networks. A big advantage of IPsec is that<br />
security arrangements can be handled without requiring changes to individual user<br />
computers.<br />
IPsec provides three choices of security service: Authentication Header (AH), Encapsulating<br />
Security Payload (ESP), and Internet Key Exchange (IKE). AH essentially allows authentication<br />
of the senders’ data. ESP supports both authentication of the sender and data encryption.<br />
IKE is used for cipher code exchange. All of them can protect one and more data flows<br />
between hosts, between host and gateway, and between gateways.<br />
56