IKE
Proposal (Phase 1) |
Name
|
The name of the proposal.
|
Enter a name.
|
Authentication algorithm
|
The Authentication Header (AH) algorithm the Services Router
uses to verify the authenticity and integrity of a packet. Supported
algorithms include the following:
-
md5—Produces a 128-bit digest.
-
sha1—Produces a 160-bit digest.
-
sha-256—Produces a 256-bit digest.
|
Select an authentication method.
|
Description
|
Easy identification of the proposal.
|
Enter brief description of the IKE proposal.
|
Dh group
|
The Diffie-Hellman exchange allows participants to produce a
shared secret value over an unsecured medium without actually transmitting
the value across the connection.
|
Select a group. If you configure multiple (up to four) proposals
for Phase 1 negotiations, use the same Diffie-Hellman group in all
proposals.
|
Encryption altorithm
|
Supported Internet Key Exchange (IKE) proposals include the
following:
-
3des-cbc—3DES-CBC encryption algorithm.
-
aes-128-cbc—AES-CBC 128-bit encryption
algorithm.
-
aes-192-cbc—AES-CBC 192-bit encryption
algorithm.
-
aes-256-cbc—AES-CBC 256-bit encryption
algorithm.
-
des-cbc—DES-CBC encryption algorithm.
|
Select an encryption algorithm.
|
Lifetime seconds
|
The lifetime (in seconds) of an IKE security association (SA).
When the SA expires, it is replaced by a new SA and security parameter
index (SPI) or terminated.
|
Select a lifetime for the IKE SA. Default: 3,600 seconds. Range:
180 through 86,400 seconds.
|