Skip to content

Commit 238ab47

Browse files
[MWAN] IPsec phases (#19160)
* changed dh group to 20 * changed phase to 20 * changed dh group e ipsec lifetime * updated group * dh group and ipsec * dhgroup and ipsec life * bolded option * phas1 lifetime * ipsec lifetime * dh group and lifetime * dh and lifetime * dh group and lifetime * removed outaded lifetime imgs * dh group and lifetime * removed outaded img * removed img * dh group and lifetime * removed outdated img * dhgroup and lifetime * dhgroup and lifetime
1 parent 0cdcc27 commit 238ab47

File tree

20 files changed

+55
-81
lines changed

20 files changed

+55
-81
lines changed
-283 KB
Binary file not shown.
Binary file not shown.
-342 KB
Binary file not shown.
Binary file not shown.
Binary file not shown.

src/content/docs/magic-wan/configuration/manually/third-party/alibaba-cloud.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ This tutorial provides information on how to connect Alibaba Cloud infrastructur
5454
2. **Negotiation Mode**: _main_
5555
3. **Encryption Algorithm**: _aes256_
5656
4. **Authentication Algorithm**: _sha256_
57-
5. **DH Group**: _group14_
57+
5. **DH Group**: _group20_
5858
6. **Localid**: This is the customer endpoint. These are generally IP addresses provided by your ISP. For example, `47.xxx.xxx.xxx`.
5959

6060
## Magic WAN

src/content/docs/magic-wan/configuration/manually/third-party/aws.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,8 @@ Additionally, you also need to configure the necessary route table entries for t
5050
- **Phase 2 encryption algorithms**: `AES256-GCM-16`
5151
- **Phase 1 integrity algorithms**: `SHA2-256`
5252
- **Phase 2 integrity algorithms**: `SHA2-256`
53-
- **Phase 1 DH group numbers**: `14`
54-
- **Phase 2 DH group numbers**: `14`
53+
- **Phase 1 DH group numbers**: `20`
54+
- **Phase 2 DH group numbers**: `20`
5555
- **IKE Version**: `ikev2`
5656
- **Startup action**: **Start**
5757
- **DPD timeout action**: `Restart`

src/content/docs/magic-wan/configuration/manually/third-party/azure.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,13 +100,13 @@ Choose the following settings when creating your VPN Connection:
100100
1. **IKE Phase 1**
101101
1. **Encryption**: _GCMAES256_ or _AES256_
102102
2. **Integrity/PRF**: _SHA256_
103-
3. **DH Group**: _DHGroup14_
103+
3. **DH Group**: _DHGroup20_
104104
2. **IKE Phase 2(IPsec)**
105105
1. **IPsec Encryption**: _GCMAES256_ or _AES256_
106106
2. **IPsec Integrity**: _SHA256_
107107
3. **PFS Group**: _PFS2048_
108108
3. **IPsec SA lifetime in KiloBytes**: `0`
109-
4. **IPsec SA lifetime in seconds**: `27000`
109+
4. **IPsec SA lifetime in seconds**: `28800`
110110
5. **Use policy based traffic selector**: **Disable**
111111
6. **DPD timeout in seconds**: `45`
112112
7. **Connection mode**: **Default**

src/content/docs/magic-wan/configuration/manually/third-party/cisco-ios-xe.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ The following is a Cisco IOS XE configuration example:
1717
crypto ikev2 proposal CF_MAGIC_WAN_IKEV2_PROPOSAL
1818
encryption aes-cbc-256
1919
integrity sha512 sha384 sha256
20-
group 14
20+
group 20
2121
!
2222
crypto ikev2 policy CF_MAGIC_WAN_IKEV2_POLICY
2323
match fvrf any
@@ -56,7 +56,7 @@ crypto ikev2 profile CF_MAGIC_WAN_02
5656
crypto ipsec profile CF_MAGIC_WAN_01
5757
set security-association lifetime kilobytes disable
5858
set security-association replay disable
59-
set pfs group14
59+
set pfs group20
6060
set ikev2-profile CF_MAGIC_WAN_01
6161
!
6262
crypto ipsec profile CF_MAGIC_WAN_02

src/content/docs/magic-wan/configuration/manually/third-party/fitelnet.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ crypto isakmp policy ISAKMP_POLICY
7878
authentication pre-share
7979
encryption aes
8080
encryption-keysize aes 256 256 256
81-
group 14
82-
lifetime 14400
81+
group 20
82+
lifetime 86400
8383
hash sha sha-256
8484
initiate-mode aggressive
8585
exit
@@ -144,8 +144,8 @@ crypto isakmp policy ISAKMP_POLICY
144144
authentication pre-share
145145
encryption aes
146146
encryption-keysize aes 256 256 256
147-
group 14
148-
lifetime 14400
147+
group 20
148+
lifetime 86400
149149
hash sha sha-256
150150
initiate-mode aggressive
151151
exit
@@ -225,7 +225,7 @@ show crypto sa
225225
Remote Authentication method : Pre-shared key
226226
Encryption algorithm : aes256-cbc
227227
Hash algorithm : hmac-sha256-128
228-
Diffie-Hellman group : 14 (2048 bits)
228+
Diffie-Hellman group : 20
229229
Initiator Cookie : aaaaaaaa bbbbbbbb
230230
Responder Cookie : cccccccc dddddddd
231231
Life time : 6852/14400 sec

0 commit comments

Comments
 (0)