Ikealgorithms - D-Link DFL-260E Reference Manual

Network security firewall cli
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

3.57. IKEAlgorithms

Description
Configure algorithms which are used in the IKE phase of an IPsec session.
Properties
Name
DESEnabled
DES3Enabled
AESEnabled
BlowfishEnabled
TwofishEnabled
CAST128Enabled
BlowfishMinKeySize
BlowfishKeySize
BlowfishMaxKeySize
TwofishMinKeySize
TwofishKeySize
TwofishMaxKeySize
AESMinKeySize
AESKeySize
AESMaxKeySize
MD5Enabled
SHA1Enabled
SHA256Enabled
SHA512Enabled
Chapter 3: Configuration Reference
Specifies a symbolic name for the object.
(Identifier)
Enable DES encryption algorithm. (Default: No)
Enable 3DES encryption algorithm. (Default: No)
Enable AES encryption algorithm. (Default: No)
Enable Blowfish encryption algorithm. (Default:
No)
Enable Twofish encryption algorithm. (Default: No)
Enable CAST128 encryption algorithm. (Default:
No)
Specifies the minimum Blowfish key size in bits.
(Default: 128)
Specifies the Blowfish preferred key size in bits.
(Default: 128)
Specifies the maximum Blowfish key size in bits.
(Default: 448)
Specifies the minimum Twofish key size in bits.
(Default: 128)
Specifies the Twofish preferred key size in bits.
(Default: 128)
Specifies the maximum Twofish key size in bits.
(Default: 256)
Specifies the minimum AES key size in bits.
(Default: 128)
Specifies the preferred AES key size in bits.
(Default: 128)
Specifies the maximum AES key size in bits.
(Default: 256)
Enable MD5 integrity algorithm. (Default: No)
Enable SHA1 integrity algorithm. (Default: No)
Enable SHA256 integrity algorithm. (Default: No)
Enable SHA512 integrity algorithm. (Default: No)
196

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560gDfl-870Dfl-860eDfl-1660Dfl-2560

Table of Contents