Efficient Networks 5800 Series User Reference Manual page 51

Business class routers
Table of Contents

Advertisement

®
Efficient Networks
5800 Series
User Reference Guide
1.
IKE Proposal Name: Enter a logical name for the IKE Proposal
Definition. This name is of no importance to the remote IKE peer.
2.
Message Authentication Scheme: Select the message authentication
scheme from two possible message authentication proposals:
MD5: Perform message authentication using Message Digest 5.
SHA1: Perform message authentication using Secure Hashing
Algorithm 1 (default).
3.
Diffie-Hellman (Oakley) Group: Select the Diffie-Hellman key
generation group from two Diffie-Hellman Group options:
Group 1: Use Diffie-Hellman Group 1 (768 bits).
Group 2: Use Diffie-Hellman Group 2 (1024 bits).
4.
Encryption Type: Select the type of encryption to be proposed:
DES: Encrypt using a 56-bit key.
3DES: Encrypt using three 56-bit keys to produce 168-bit
encryption.
5.
Phase 1 Proposal Lifetime: Select the duration of this proposal, as
measured in seconds. The default setting is 86400 seconds (24 hours).
Once this lifetime is elapsed, your router will renegotiate the IKE
connection.
®
Efficient Networks
Chapter 3: Additional Features
Page 3-19

Advertisement

Table of Contents
loading

Table of Contents