
617
Field descriptions
Policy field descriptions
IPsec static key policy Properties—Data Integrity Preferences tab
The data integrity preference is one of the algorithms that you specify when you create an IPsec/IKE
policy for VPN tunnels. It dictates the type of authentication header that will be prepended to packets
sent through the tunnel.
Associated tasks
The task that you can perform with this tab is:
■
“Creating a VPN policy for IPsec with static key”
IPsec static key policy Properties—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as search criteria for filters.
The maximum length is 20,000 alphanumeric characters.
Clientless VPN
Symantec Clientless VPN enables complete, secure, authenticated, auditable, and controlled remote
access to email, shared network files and resources, corporate applications, corporate intranets, and
corporate Web-based applications from any location. Remote users at any dial-up, broadband, or
wireless access point can gain access to specific applications by logging in to a secure extranet.
Table D-51
IPsec static key policy Properties—Data Integrity Preferences tab
Field
Description
Available
Select a data integrity preference from this list and click the right-arrow >> button to move
it to the Selected list.
This specifies the type of authentication header that is prepended to packets sent through
the tunnel. Supported types are:
■
SHA1
Uses an algorithm that generates a 160-bit message digest (slower but more secure
than MD5).
■
MD5
Uses an algorithm that generates a 128-bit message digest (faster but less secure than
SHA1).
■
No Checksum
Specifies no authentication checksum.
Selected
The data integrity preference currently selected for use with the VPN policy.
The default is MD5.
Up
Moves the selected item in the Selected list up in the list.
If more than one algorithm is assigned, the first one is tried, and if unsuccessful, the next
algorithm is tried.
Down
Moves the selected item in the Selected list down in the list.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...