Specify how long SA is used as a communication tunnel. Select the [Specify by Time] or [Specify by Size] check
box or both check boxes as necessary. If both check boxes are selected, the IPSec SA session is terminated
when either of the conditions has been satisfied.
[Specify by Time]
[Specify by Size]
If you have selected the [Specify by Size] check box only
The IKE SA validity cannot be specified by size, so that the initial value (480 minutes) of [Specify by Time] is
Select the protocol and algorithm to use for IPSec communication.
Automatically setting up connection
Choose [ESP] and select the authentication algorithm and encryption algorithm.
Choose [AH], and select the hash algorithm to use for AH authentication from [AH Authentication].
The connection mode of IPSec is displayed. The machine supports transport mode, in which the payloads of
IP packets are encrypted. Tunnel mode, in which whole IP packets (headers and payloads) are encapsulated
is not available.
If you need to register an additional security policy, return to step 5.
Arrange the order of policies listed under [IPSec Policy List].
Policies are applied from one at the highest position to the lowest. Click [Raise Priority] or [Lower Priority] to
move a policy up or down the order.
Enter a time in minutes to specify how long a session lasts. The entered time is applied
to both IPSec SA and IKE SA.
Enter a size in megabytes to specify how much data can be transported in a session.
The entered size is applied to IPSec SA only.
ESP is enabled and the authentication algorithm is set to [SHA1 and MD5].
ESP is enabled and the encryption algorithm is set to [3DES-CBC and AES-CBC].
Select the hash algorithm to use for ESP authentication.
Select the encryption algorithm for ESP.