This section lists all of the functions and properties of the LCOS VPN module. Experts of the VPN sector are offered a highly compressed summary of the performance of the function. Understanding the terminology requires a sound knowledge of the technical fundamentals of VPN. However, for commissioning and normal operation of the VPN, this information is non-essential.
- VPN tunnel via leased lines, switched connections and IP networks
- LANCOMDynamic VPN: Public IP addresses can be static or dynamic (establishing a connection with remote sites using dynamic IP addresses requires ISDN)
- VPN in accordance with IPSec standard
- IPSec protocols ESP, AH and IPCOMP in tunnel mode
- Hash algorithms:
- HMAC-MD5-96, hash length 128 bits
- HMAC-SHA-1-96, hash length 160 bits
- HMAC-SHA-1-256, hash length 256 bits
- HMAC-SHA-1-384, hash length 384 bits
- HMAC-SHA-1-512, hash length 512 bits
- Compression with "Deflate" (ZLIB)
- Key management as per ISAKMP (IKEv1, IKEv2)
- Symmetrical encryption methods
- AES, key lengths of 128, 192 and 256 bits
- Triple-DES (3DES), key length 168 bit
- Blowfish, key length 128 - 448 bits
- CAST, key length 128 bits
- DES, key length 56 bits
- IKEv1 main and aggressive mode
- IKEv1/IKEv2 config mode
- IKEv1 with pre-shared keys and IKEv2
- IKEv1 and IKEv2 with RSA signature and digital certificates (X.509)
- Key exchange via Oakley, Diffie-Hellman algorithm with key lengths 768 bits, 1024 bits, 1536 bits, 2048 bits, 3072 bits and 4096 bits (well-known groups 1, 2, 5, 14, 15 and 16)