IPsec Encryption Levels
The encryption level defines a set of
and
algorithms.
Below a complete list of algorithms is displayed for each level in order of decreasing
priority, as well as a set of commands crypto ike proposal to setup this profile manually.
In the list of algorithms is indicated:
• encryption with key length
• hash function for
forming
•
mode (NO if disabled)
D.1 weak
AES128-SHA1-MODP1024
IKE
AES128-SHA1-MODP768
AES128-MD5-MODP1024
AES128-MD5-MODP768
3DES-SHA1-MODP1024
3DES-SHA1-MODP768
3DES-MD5-MODP1024
3DES-MD5-MODP768
DES-SHA1-MODP1024
DES-SHA1-MODP768
DES-MD5-MODP1024
DES-MD5-MODP768
DES-MD5-NO
IPsec SA
AES128-SHA1-NO
3DES-SHA1-NO
DES-SHA1-NO
AES128-MD5-NO
D
Keenetic Extra (KN-1710) — Command Reference Guide
349
Summary of Contents for EXTRA KN-1710
Page 2: ......
Page 6: ...Command Reference Guide Keenetic Extra KN 1710 6 Contents Overview...
Page 20: ...Command Reference Guide Keenetic Extra KN 1710 20 Chapter 1 Product Overview...
Page 26: ...Command Reference Guide Keenetic Extra KN 1710 26 Chapter 2 Introduction to the CLI...
Page 322: ...Command Reference Guide Keenetic Extra KN 1710 322 Chapter 3 Command Reference...
Page 332: ...Command Reference Guide Keenetic Extra KN 1710 332 Glossary...
Page 348: ...Command Reference Guide Keenetic Extra KN 1710 348 Appendix C SNMP MIB...