Efficient Networks 5800 User Manual

Page 51

Advertising
background image

Efficient Networks

®

5800 Series

User Reference Guide

Chapter 3: Additional Features

Efficient Networks

®

Page 3-19

1. IKE Proposal Name: Enter a logical name for the IKE Proposal

Definition. This name is of no importance to the remote IKE peer.

2. Message Authentication Scheme: Select the message authentication

scheme from two possible message authentication proposals:

MD5: Perform message authentication using Message Digest 5.

SHA1: Perform message authentication using Secure Hashing

Algorithm 1 (default).

3. Diffie-Hellman (Oakley) Group: Select the Diffie-Hellman key

generation group from two Diffie-Hellman Group options:

Group 1: Use Diffie-Hellman Group 1 (768 bits).

Group 2: Use Diffie-Hellman Group 2 (1024 bits).

4. Encryption Type: Select the type of encryption to be proposed:

DES: Encrypt using a 56-bit key.

3DES: Encrypt using three 56-bit keys to produce 168-bit

encryption.

5. Phase 1 Proposal Lifetime: Select the duration of this proposal, as

measured in seconds. The default setting is 86400 seconds (24 hours).

Once this lifetime is elapsed, your router will renegotiate the IKE

connection.

Advertising