R3166-R3206-HP High-End Firewalls VPN Configuration Guide-6PW101
50
Field Descri
p
tion
Encryption Algorithm
Encryption algorithm that the security protocol uses.
Return to IPsec configuration task list.
Viewing packet statistics
Select VPN > IPSec > Statistics from the navigation tree to view packet statistics, as shown in Figure 36.
Figure 36 Packet statistics
Return to IPsec configuration task list.
IPsec configuration example
Network requirements
• As shown in Figure 37, an IPsec tunnel is established between Firewall A and Firewall B to protect
traffic between subnet 10.1.1.0/24 (represented by Host A) and subnet 10.1.2.0/24 (represented by
Host B).
• The security protocol to be used is ESP, encryption algorithm is DES, and authentication algorithm
is SHA-1.