793
Field descriptions
Menu option field descriptions
Associated tasks
The task that you can perform with this tab is:
■
“Viewing or modifying the global IKE policy”
Global IKE Policy Properties—Data Integrity Preference tab
The Data Integrity Preference tab lets you select the level of authentication in VPN tunnels.
Associated tasks
.
■
“Viewing or modifying the global IKE policy”
Global IKE Policy Properties—Diffie-Hellman Groups tab
The Diffie-Hellman Groups tab lets you select the method of establishing shared secrets in VPN
tunnels
Table D-295
Global IKE Policy Properties—Data Privacy Preference tab
Field
Description
Available
Data privacy algorithms available for use. The options are:
■
DES
Uses the Data Encryption Standard using a 56-bit key
■
Triple DES
Uses the triple Data Encryption Standard using three 56-bit keys
The default is Triple DES and DES.
Selected
Data privacy methods selected for packet data. You can use a combination of these options.
The one listed first is tried first. If this method is unsuccessful, then the next method is
tried.
Up
Moves a selected entry up in the Selected list.
Down
Moves a selected entry down in the Selected list.
Table D-296
Global IKE Policy Properties—Data Integrity Preference tab
Field
Description
Available
The data integrity algorithms available for use. The options are:
■
MD5
Uses an algorithm that generates a 128-bit message digest (faster but less secure than
SHA1)
■
SHA1
Uses an algorithm that generates a 160-bit message digest (slower but more secure
than MD5)
Selected
The data integrity methods selected to authenticate packet data. You can use a combination
of these options. The one listed first is tried first. If this method is unsuccessful, then the
next method is tried.
Up
Moves a selected entry up in the Selected list.
Down
Moves a selected entry down in the Selected list.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...