104
Chapter 10 - Configuring VPN
ASUS SL1200
Pre-configured IKE proposals
IKE proposals decide the type of encryption, hash algorithms, and
authentication method that will be used for the establishment of the
session keys between the endpoints of a tunnel. Table 10.2 lists the pre-
configured IKE proposals.
Table 10.2. Pre-Configured IKE proposals in the router
Name
Encryption
Algorithm
Authentication
Algorithm
D i f f i e - H e l l m a n
Group
Key Manage-
ment
Lifetime
(secs)
ike-
preshared-
3des-sha1-
dh2
3DES
SHA-1
2
Pre-shared
Keys
3600
ike-
preshared-
3des-md5-
dh2
3DES
MD5
2
Pre-shared
Keys
3600
ike-pre-
shareddes-
sha1-dh2
DES
SHA-1
2
Pre-shared
Keys
3600
ike-pre-
shareddes-
md5-dh2
DES
MD5
2
Pre-shared
Keys
3600
ike-
preshared-
3des-sha1-
dh1
3DES
SHA-1
1
Pre-shared
Keys
3600
ike-
preshared-
3des-md5-
dh1
3DES
MD5
1
Pre-shared
Keys
3600
1
ike-pre-
shareddes-
sha1-dh1
DES
SHA-1
1
Pre-shared
Keys
3600
i k e - p r e -
shareddes-
md5-dh1
DES
MD5
1
Pre-shared
Keys
3600
ike-
preshared-
3des-sha1-
dh5
3DES
SHA-1
5
Pre-shared
Keys
3600