
Gigarouter
UF72N User Manual
Page 160 of 203
Figure 4-106 Configure IKE Proposal
The following items are displayed on this screen:
►
Proposal Name:
Specify a unique name to the IKE proposal for identification and management
purposes. The IKE proposal can be applied to IPSEC proposal.
►
Encryption Algorithm:
Specify the encryption algorithm for IKE negotiation. Options include:
DES:
DES (Data Encryption Standard) encrypts a 64-bit block of plain text
with a 56-bit key.
3DES:
Triple DES, encrypts a plain text with 168-bit key.
AES:
Uses the AES algorithm for encryption.
►
Auth Algorithm:
Select the authentication algorithm for IKE negotiation. Options include:
MD5:
MD5 (Message Digest Algorithm) takes a message of arbitrary length
and generates a 128-bit message digest.
SHA1:
SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the
64th power of 2) in bits and generates a 160-bit message digest.
►
DH Group:
Select the DH (Diffie-Hellman) group to be used in key negotiation phase 1.
The DH Group sets the strength of the algorithm in bits. Options include
DH
768 modp
,
DH 1024 modp
and
DH 1536 modp
.
4.3.6.3.2 IKE Safety Policy
The command “show ike-policy” shows the IKE Policy information as below:
Содержание UNIFIBER GIGAROUTER UF72N
Страница 1: ......
Страница 8: ...4 5 7 SNMP 201...
Страница 101: ...Gigarouter UF72N User Manual Page 93 of 203 Figure 3 142 Add Printer Driver...
Страница 129: ...Gigarouter UF72N User Manual Page 121 of 203 Input 4 to configure MAC filtering parameter as below...
Страница 142: ...Gigarouter UF72N User Manual Page 134 of 203...
Страница 157: ...Gigarouter UF72N User Manual Page 149 of 203...
Страница 178: ...Gigarouter UF72N User Manual Page 170 of 203...
Страница 182: ...Gigarouter UF72N User Manual Page 174 of 203...