Owner's Manual
430
Figure 13-10. Adaptive Services—IP Sec IKE Proposal
Use the
Add, Edit
,
Delete,
and
Export
buttons to manage the security proposals listed in the table
at the top of this screen. Like other screens, the
Name
field is a unique identifier for the configured
proposal. The
Ty p e
selection determines what fields appear below it. Here, we selected IPSec
Proposal. The fields:
-
Authentication Algorithm
—Either
md5
(128 bit) or
sha1
(160 bit)
-
Authentication Method
—Either
dsa-signatures
(Digital Signature Algorithm),
preshared keys
,
or
rsa signature
.
-
Diffie-Hellman Group
—Select from the pick list. This public cryptographic scheme allows two
parties to establish a shared secret. Types:
group 1—768 bit.
group 2— 1024 bit (provides more security, but processing requires more time)
Encryption Algorithm
—Select from the pick list:
3des-cbc
,
des-cbc
.
-
Lifetime
—The lifetime of an IKE SA. Can be from 180 - 86400 seconds. The default is 3600
seconds.
IP Security – IP Sec Proposal
Choosing IP Sec proposal
Ty p e
changes the fields at the bottom of the screen.