Field
Description
•
%0
: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 192 bits.
•
%0
: Rijndael has been nominated as AES due to its
fast key setup, low memory requirements, high level of secur-
ity against attacks and general speed. Here, it is used with a
key length of 256 bits.
•
*&
: Twofish was a final candidate for the AES
(Advanced Encryption Standard). It is rated as just as secure
as Rijndael (AES), but is slower.
•
B *&
: Blowfish is a very secure and fast algorithm.
Twofish can be regarded as the successor to Blowfish.
•
40
: CAST is also a very secure algorithm, marginally
slower than Blowfish, but faster than 3DES.
•
9%0
: DES is an older encryption algorithm, which is rated as
weak due to its small effective length of 56 bits.
Hash algorithms (Authentication):
•
,9
(default value): MD 5 (Message Digest #5) is an older
hash algorithm. It is used with a 96 bit digest length for IPSec.
•
: All options can be used.
•
0A
: SHA1 (Secure Hash Algorithm #1) is a hash al-
gorithm developed by the NSA (United States National Secur-
ity Association). It is rated as secure, but is slower than MD5.
It is used with a 96 bit digest length for IPSec.
Note that RipeMD 160 and Tiger 192 are not available for mes-
sage hashing in phase 2.
Use PFS Group
As PFS (Perfect Forward Secrecy) requires another Diffie-
Hellman key calculation to create new encryption material, you
must select the exponentiation features. If you enable PFS ( En-
abled), the options are the same as for the configuration in
Phase 1: Group. PFS is used to protect the keys of a renewed
phase 2 SA, even if the keys of the phase 1 SA have become
known.
The field has the following options:
•
'1"(
: During the Diffie-Hellman key calculation,
12 VPN
Funkwerk Enterprise Communications GmbH
244
funkwerk TR200aw/bw