X4-A11-W-A Digi International, X4-A11-W-A Datasheet - Page 94

no-image

X4-A11-W-A

Manufacturer Part Number
X4-A11-W-A
Description
PORT XBEE 802.15.4 - WIFI802.11G
Manufacturer
Digi International
Series
ConnectPort™ X4r
Datasheets

Specifications of X4-A11-W-A

Function
Transceiver, Xbee, Gateway
Modulation Or Protocol
802.15.4 Zigbee
Frequency
2.4GHz
Interface
1 USB, 1 RS-232, 1 RJ-45
Sensitivity
-93dBm
Power - Output
15dBm
Data Rate - Maximum
54Mbps
Voltage - Supply
6 V ~ 30 V
Wireless Frequency
2.4 GHz
Interface Type
RS-232, Ethernet, SMA
Security
NAT, DES, 3DES, 256 bit AES
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Features
-
Applications
-
Lead Free Status / Rohs Status
Lead free / RoHS Compliant
For Use With/related Products
NS9360
Other names
602-1109
ISAKMP Phase 1 Settings
configured on the remote VPN device. If aggressive mode is selected, then the VPN
device will try aggressive mode first, and then try main mode if aggressive mode
fails.
guarantees that if one key is broken by an attacker, that does not help him to break
another key. PFS is more secure, but slows down the negotiation process. Both the
Digi unit and the remote VPN device must be configured the same way.
the two VPN devices.
messages. Once a connection is established through a firewall, the VPN devices
have to send keep alive messages to prevent the NAT firewall from timing out the
connection. Set the interval to a value less than the connection timeout of the NAT
firewall.
authentication method to be used to establish the initial ISAKMP connection.
During this phase, the two VPN devices verify each other’s identity and create a
security association (encrypted connection) which is used during phase 2. The
encryption and authentication settings you specify determine the level of security in
the connection the two VPN devices used to communicate with each other.
important thing is to make sure that the Digi unit and the remote VPN device use the
same policies. If more than one policy is specified, the VPN devices will use the
most secure policy that they both have been configured to support.
shared key.
more secure it is.
MD5.
group the more secure it is.
General Security Settings for Phase 1
Connection Mode: Main|Aggressive: Set the connection mode to match that
Enable Perfect Forward Secrecy (PFS): Set this option to enable PFS. PFS
NAT-T Settings
Enable NAT Traversal (NAT-T): Set this option if there is a NAT firewall between
Keep Alive Interval: The amount of time in seconds between NAT keep alive
ISAKMP Phase 1 Policies:
Keys are negotiated in two phases. The first phase negotiates the keys and
Select the policies to be used during phase 1 of the ISAKMP negotiation. The most
Pre-shared Key: Using DSS and RSA signatures is more secure than using a pre-
Encryption: The encryption type and the length of the key. The longer the key the
Integrity: The authentication algorithm. The SHA1 algorithm is more secure than
SA Lifetime: The maximum length of the phase 1 security association.
Diffie-Hellman: The Diffie-Hellman group to use for key generation. The larger the
C o n f i g u r e D i g i d e v i c e s
9 4

Related parts for X4-A11-W-A