Chapter 3: Additional Features
IKE IPSec Proposal Definition
Figure 3-10: IKE IPSec Proposal Definition Screen
1.
IKE IPSec Proposal Name: Enter a logical name for the IKE IPSec
Proposal Definition. This name is of no importance to the remote IKE
IPSec peer.
2.
AH Authentication Scheme: Select which AH method to propose:
–
NONE: Request no AH encapsulation.
–
MD5: Request AH encapsulation and authenticate using Message
Page 3-20
®
Efficient Networks
5800 Series
User Reference Guide
Efficient Networks
®