
616
Field descriptions
Policy field descriptions
IPsec static key policy Properties—Data Privacy Preference tab
The data privacy preference is one of the algorithms that you specify when you create an IPsec/static
policy for VPN tunnels. It specifies the encapsulation security payload for packets sent through the
tunnel.
Associated tasks
The task that you can perform with this tab is:
■
“Creating a VPN policy for IPsec with static key”
Table D-50
IPsec static key policy Properties—Data Privacy Preference tab
Field
Description
Available
Select a data privacy preference from this list and click the right-arrow >> button to move it
to the Selected list.
The options are:
■
No Encryption
This is the default.
■
DES
Uses the Data Encryption Standard using a 56-bit key to encrypt and decrypt messages
■
3DES.
Uses triple Data Encryption Standard using three 56-bit keys to encrypt and decrypt
messages.
■
AES-16
Uses Advanced Encryption Standard with a 16-byte key to encrypt and decrypt
messages.
■
AES-24
Uses Advanced Encryption Standard with a 24-byte key to encrypt and decrypt
messages.
■
AES-32
Uses Advanced Encryption standard with a 32-byte key to encrypt and decrypt
messages.
In a static policy, you can select only one data privacy algorithm.
Selected
Lists data privacy methods that are currently in use in the policy.
The default is No Encryption.
Up
Moves the selected item in the Selected list up in the list.
If more than one algorithm is assigned, the first one is tried, and if unsuccessful, the next
algorithm is tried.
Down
Moves the selected item in the Selected list down in the list.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...