R3166-R3206-HP High-End Firewalls VPN Configuration Guide-6PW101

50
Field Descri
p
tion
Encryption Algorithm
Encryption algorithm that the security protocol uses.
Return to IPsec configuration task list.
Viewing packet statistics
Select VPN > IPSec > Statistics from the navigation tree to view packet statistics, as shown in Figure 36.
Figure 36 Packet statistics
Return to IPsec configuration task list.
IPsec configuration example
Network requirements
As shown in Figure 37, an IPsec tunnel is established between Firewall A and Firewall B to protect
traffic between subnet 10.1.1.0/24 (represented by Host A) and subnet 10.1.2.0/24 (represented by
Host B).
The security protocol to be used is ESP, encryption algorithm is DES, and authentication algorithm
is SHA-1.