611
Field descriptions
Policy field descriptions
IPsec/IKE policy Properties—Data Privacy Preference tab
The data privacy preference is one of the algorithms that you specify when you create an IPsec/IKE
policy for VPN tunnels. It specifies the encapsulation security payload for packets sent through the
tunnel.
Associated tasks
The task that you can perform with this tab is:
■
“Configuring VPN policy for IPsec with IKE”
Table D-45
IPsec IKE policy Properties—Data Privacy Preference tab
Field
Description
Available
Select a data privacy preference and click the right-arrow >> button to move it to the
Selected list. The options are:
■
DES
Uses the Data Encryption Standard using 56-bit key
■
3DES
Uses the triple Data Encryption Standard using three 56-bit keys
■
AES-16
Uses Advanced Encryption Standard with a 16-byte key
■
AES-24
Uses Advanced Encryption Standard with a 24-byte key
■
AES-32
Uses Advanced Encryption Standard with a 32-byte key
■
No Encryption
An IPsec policy can include more than one data privacy preference. The one that is used is
negotiated by the originator of the connection. If the security gateway is the originator, the
first one in this list is requested for connection.
Selected
Lists data privacy algorithms that are used in the policy.
The default is No Encryption
Up
Moves the selected item in the Selected list up in the list.
If more than one algorithm is assigned, the first one is tried, and if unsuccessful, the next
algorithm is tried.
Down
Moves the selected item in the Selected list down in the list.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...