Check Point UTM-1 Edge User Manual page 535

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

Table 109: Security Methods Fields
In this field...
Do this...
Phase 1
Security Methods
Select the encryption and integrity algorithm to use for IKE negotiations:
Diffie-Hellman
Select the Diffie-Hellman group to use:
group
A group with more bits ensures a stronger key but lowers performance.
Renegotiate every
Type the interval in minutes between IKE Phase-1 key negotiations. This
is the IKE Phase-1 SA lifetime.
A shorter interval ensures higher security, but impacts heavily on
performance. Therefore, it is recommended to keep the SA lifetime
around its default value.
The default value is 1440 minutes (one day).
Phase 2
Security Methods
Select the encryption and integrity algorithm to use for VPN traffic:
Chapter 16: Working with VPNs
Automatic. The UTM-1 appliance automatically selects the best
security methods supported by the site. This is the default.
A specific algorithm
Automatic. The UTM-1 appliance automatically selects a group.
This is the default.
A specific group
Automatic. The UTM-1 appliance automatically selects the best
security methods supported by the site. This is the default.
A specific algorithm
Adding and Editing VPN Sites
521

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF