Controller Security
4 Revise the following information as required to render the existing transform set useful.
Name
AH Authentication
Scheme
ESP Encryption
Scheme
ESP Authentication
Scheme
378
The name is read-only and cannot be modified unless a new transform
set is created.
Use AH
Select the
checkbox (if necessary) to modify the AH Transform
Authentication scheme. Options include:
None
•
- No AH authentication is used.
AH-MD5-HMAC
•
- AH with the MD5 (HMAC variant) authentication
algorithm.
AH-SHA-HMAC
•
- AH with the SHA (HMAC variant) authentication
algorithm.
Use ESP
Select the
checkbox (if necessary) to modify the ESP Encryption
Scheme. Options include:
None
•
- No ESP encryption is used with the transform set.
•
ESP-DES
- ESP with the 56-bit DES encryption algorithm.
ESP-3DES
•
- ESP with 3DES, ESP with AES.
ESP-AES
•
- ESP with 3DES, ESP with AES (128 bit key).
ESP-AES 192
•
- ESP with 3DES, ESP with AES (192 bit key).
ESP-AES 256
•
- ESP with 3DES, ESP with AES (256 bit key).
Select the
Use ESP
checkbox (if necessary) to modify the ESP
Authentication Scheme. Options include:
None
•
- No ESP authentication is used with the transform set.
•
MD5-HMAC
- AH with the MD5 (HMAC variant) authentication
algorithm.
SHA-HMAC
•
- AH with the SHA (HMAC variant) authentication
algorithm.
Summit WM3000 Series Controller System Reference Guide