Jump to content

Template:Networking rutos manual vpn: Difference between revisions

no edit summary
No edit summary
Line 878: Line 878:
         <td>integer; default: <b>none</b></td>
         <td>integer; default: <b>none</b></td>
         <td>The frequency of sending R_U_THERE messages or INFORMATIONAL exchanges to peer.</td>
         <td>The frequency of sending R_U_THERE messages or INFORMATIONAL exchanges to peer.</td>
    </tr>
    <tr>
    <td><span style="color: #0054a6;">Dead Peer Detection:</span> DPD Timeout</td>
        <td>integer; default: <b>none</b></td>
        <td>Defines the timeout interval, after which all connections to a peer are deleted in case of inactivity.</td>
     </tr>
     </tr>
     <tr>
     <tr>
Line 1,028: Line 1,033:
     <tr>
     <tr>
     <td>DH group</td>
     <td>DH group</td>
         <td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521; default: <b>MODP1536</b></td>
         <td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521 {{!}} No PFS; default: <b>MODP1536</b></td>
         <td>Diffie-Hellman (DH) group used in the key exchange process. Higher group numbers provide more security, but take longer and use more resources to compute the key. Must match with another incoming connection to establish IPSec. </td>
         <td>Diffie-Hellman (DH) group used in the key exchange process. Higher group numbers provide more security, but take longer and use more resources to compute the key. Must match with another incoming connection to establish IPSec. </td>
     </tr>
     </tr>
Line 1,055: Line 1,060:
     </tr>
     </tr>
     <tr>
     <tr>
     <td>Hash algorithm</td>
     <td>Encryption algorithm</td>
         <td>3DES {{!}} AES 128 {{!}} AES 192 {{!}} AES 256 {{!}} AES128 GCM8 {{!}} AES192 GCM8 {{!}} AES256 GCM8 {{!}} AES128 GCM12 {{!}} AES192 GCM12 {{!}} AES256 GCM12 {{!}} AES128 GCM16 {{!}} AES192 GCM16 {{!}} AES256 GCM16; default: <b>AES 128</b></td>
         <td>3DES {{!}} AES 128 {{!}} AES 192 {{!}} AES 256 {{!}} AES128 GCM8 {{!}} AES192 GCM8 {{!}} AES256 GCM8 {{!}} AES128 GCM12 {{!}} AES192 GCM12 {{!}} AES256 GCM12 {{!}} AES128 GCM16 {{!}} AES192 GCM16 {{!}} AES256 GCM16; default: <b>3DES</b></td>
         <td>Algorithm used for data encryption.</td>
         <td>Algorithm used for data encryption.</td>
     </tr>
     </tr>
     <tr>
     <tr>
     <td>Hash algorithm</td>
     <td>Hash algorithm</td>
         <td>MD5 {{!}} SHA1 {{!}} SHA256 {{!}} SHA384 {{!}} SHA512; default: <b>SHA1</b></td>
         <td>MD5 {{!}} SHA1 {{!}} SHA256 {{!}} SHA384 {{!}} SHA512; default: <b>MD5</b></td>
         <td>Algorithm used for exchanging authentication and hash information.</td>
         <td>Algorithm used for exchanging authentication and hash information.</td>
     </tr>
     </tr>
     <tr>
     <tr>
     <td>PFS group</td>
     <td>PFS group</td>
         <td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521; default: <b>MODP1536</b></td>
         <td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521 {{!}} No PFS; default: <b>MODP768</b></td>
         <td>The PFS (Perfect Forward Secrecy). Must match with another incoming connection to establish IPSec. </td>
         <td>The PFS (Perfect Forward Secrecy). Must match with another incoming connection to establish IPSec. </td>
     </tr>
     </tr>
Line 1,123: Line 1,128:
     <tr>
     <tr>
       <td>Client to client</td>
       <td>Client to client</td>
       <td>string; default: <b>none</b></td>
       <td>off {{!}} on; default: <b>off</b></td>
       <td>Adds route to make other PPTP clients reachable.</td>
       <td>Adds route to make other PPTP clients reachable.</td>
     </tr>
     </tr>