[Contents] [Prev] [Next] [Index] [Report an Error]

Supported Transforms

Table 12 describes the supported transforms.

Table 12: Supported Transforms

Transform

Description

AH-MD5

IPSec performs AH protocol encapsulation using the MD5 hash function with HMAC message authentication.

AH-SHA

IPSec performs AH protocol encapsulation using the SHA-1 hash function with HMAC message authentication. SHA-1 is considered stronger than MD5.

ESP-MD5

IPSec performs ESP protocol encapsulation using the MD5 hash function with HMAC message authentication.

ESP-SHA

IPSec performs ESP protocol encapsulation using the SHA-1 hash function with HMAC message authentication. SHA-1 is considered stronger than MD5.

ESP-DES

IPSec performs ESP protocol encapsulation using the DES encryption algorithm. DES uses a 56-bit symmetric key and is considered a weak (breakable) encryption algorithm.

ESP-3DES

IPSec performs ESP protocol encapsulation using the 3DES encryption algorithm. 3DES uses a 168-bit symmetric encryption key and is widely accepted as a strong encryption algorithm. Export control issues apply to products that ship from the USA with 3DES.

ESP-DES-MD5

Combination of ESP-MD5 and ESP-DES transforms.

ESP-DES-SHA

Combination of ESP-SHA and ESP-DES transforms.

ESP-3DES-MD5

Combination of ESP-MD5 and ESP-3DES transforms.

ESP-3DES-SHA

Combination of ESP-SHA and ESP-3DES transforms.

Table 13 lists the security functions achieved with the supported transforms, and provides a view of which combinations can be used, depending on security requirements.

Table 13: Supported Security Transform Combinations

Security Type

Supported Transform Combinations

Data authentication only

AH-HMAC-MD5

AH-HMAC-SHA

ESP-HMAC-MD5

ESP-HMAC-SHA

Data confidentiality only

ESP-DES

ESP-3DES

Data authentication and confidentiality

ESP-DES-MD5

ESP-DES-SHA

ESP-3DES-MD5

ESP-3DES-SHA

The ISM does not support both the ESP and AH encapsulation modes concurrently on the same secure tunnel.


[Contents] [Prev] [Next] [Index] [Report an Error]