Template:Networking rutos manual vpn: Difference between revisions
Template:Networking rutos manual vpn (view source)
Revision as of 16:36, 28 February 2022
, 28 February 2022no edit summary
Gytispieze (talk | contribs) |
Gytispieze (talk | contribs) No edit summary |
||
Line 878: | Line 878: | ||
<td>integer; default: <b>none</b></td> | <td>integer; default: <b>none</b></td> | ||
<td>The frequency of sending R_U_THERE messages or INFORMATIONAL exchanges to peer.</td> | <td>The frequency of sending R_U_THERE messages or INFORMATIONAL exchanges to peer.</td> | ||
</tr> | |||
<tr> | |||
<td><span style="color: #0054a6;">Dead Peer Detection:</span> DPD Timeout</td> | |||
<td>integer; default: <b>none</b></td> | |||
<td>Defines the timeout interval, after which all connections to a peer are deleted in case of inactivity.</td> | |||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 1,028: | Line 1,033: | ||
<tr> | <tr> | ||
<td>DH group</td> | <td>DH group</td> | ||
<td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521; default: <b>MODP1536</b></td> | <td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521 {{!}} No PFS; default: <b>MODP1536</b></td> | ||
<td>Diffie-Hellman (DH) group used in the key exchange process. Higher group numbers provide more security, but take longer and use more resources to compute the key. Must match with another incoming connection to establish IPSec. </td> | <td>Diffie-Hellman (DH) group used in the key exchange process. Higher group numbers provide more security, but take longer and use more resources to compute the key. Must match with another incoming connection to establish IPSec. </td> | ||
</tr> | </tr> | ||
Line 1,055: | Line 1,060: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td> | <td>Encryption algorithm</td> | ||
<td>3DES {{!}} AES 128 {{!}} AES 192 {{!}} AES 256 {{!}} AES128 GCM8 {{!}} AES192 GCM8 {{!}} AES256 GCM8 {{!}} AES128 GCM12 {{!}} AES192 GCM12 {{!}} AES256 GCM12 {{!}} AES128 GCM16 {{!}} AES192 GCM16 {{!}} AES256 GCM16; default: <b> | <td>3DES {{!}} AES 128 {{!}} AES 192 {{!}} AES 256 {{!}} AES128 GCM8 {{!}} AES192 GCM8 {{!}} AES256 GCM8 {{!}} AES128 GCM12 {{!}} AES192 GCM12 {{!}} AES256 GCM12 {{!}} AES128 GCM16 {{!}} AES192 GCM16 {{!}} AES256 GCM16; default: <b>3DES</b></td> | ||
<td>Algorithm used for data encryption.</td> | <td>Algorithm used for data encryption.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>Hash algorithm</td> | <td>Hash algorithm</td> | ||
<td>MD5 {{!}} SHA1 {{!}} SHA256 {{!}} SHA384 {{!}} SHA512; default: <b> | <td>MD5 {{!}} SHA1 {{!}} SHA256 {{!}} SHA384 {{!}} SHA512; default: <b>MD5</b></td> | ||
<td>Algorithm used for exchanging authentication and hash information.</td> | <td>Algorithm used for exchanging authentication and hash information.</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>PFS group</td> | <td>PFS group</td> | ||
<td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521; default: <b> | <td>MODP768 {{!}} MODP1024 {{!}} MODP1536 {{!}} MODP2048 {{!}} MODP3072 {{!}} MODP4096 {{!}} ECP192 {{!}} ECP224 {{!}} ECP256 {{!}} ECP384 {{!}} ECP521 {{!}} No PFS; default: <b>MODP768</b></td> | ||
<td>The PFS (Perfect Forward Secrecy). Must match with another incoming connection to establish IPSec. </td> | <td>The PFS (Perfect Forward Secrecy). Must match with another incoming connection to establish IPSec. </td> | ||
</tr> | </tr> | ||
Line 1,123: | Line 1,128: | ||
<tr> | <tr> | ||
<td>Client to client</td> | <td>Client to client</td> | ||
<td> | <td>off {{!}} on; default: <b>off</b></td> | ||
<td>Adds route to make other PPTP clients reachable.</td> | <td>Adds route to make other PPTP clients reachable.</td> | ||
</tr> | </tr> |