User Guide

Table Of Contents
166
Parameter
Description
hexadecimal characters is required.
- AES-192: A 192-bit key is used for encryption. A key of 24 ASCII characters or 48
hexadecimal characters is required.
- AES-256: A 256-bit key is used for encryption. A key of 32 ASCII characters or 64
hexadecimal characters is required.
ESP Encryption Key
This parameter should be the same for IPSec peers.
ESP Authentication
Algorithm
Optional service to ensure the integrity of data packets.
- MD5: A 128-bit message digest is generated to prevent message tampering. The
authentication key must be 16 ASCII characters or 32 hexadecimal characters.
- SHA1: A 160-bit message digest is generated to prevent message tampering. The
authentication key must be 20 ASCII characters or 40 hexadecimal characters.
ESP Authentication
Key
This parameter should be the same for IPSec peers.
ESP Outgoing SPI
SPI is used to identify an IPSec SA with the IP address and security protocol of the
remote gateway.
This parameter should be the same for IPSec peers.
ESP Incoming SPI
This parameter should be the same for IPSec peers.
AH Authentication
Algorithm
Optional service to ensure the integrity of data packets.
- MD5: A 128-bit message digest is generated to prevent message tampering. The
authentication key must be 16 ASCII characters or 32 hexadecimal characters.
- SHA1: A 160-bit message digest is generated to prevent message tampering. The
authentication key must be 20 ASCII characters or 40 hexadecimal characters.
AH Authentication
Key
This parameter should be the same for IPSec peers.
AH Outgoing SPI
This parameter should be the same for IPSec peers.
AH Incoming SPI
This parameter should be the same for IPSec peers.
Configuring transport mode
Step 1 Choose More > IPSec. The following page appears.