User's Manual

Table Of Contents
Security Protocol:
Select the security protocol to be used. Options include:
AH: AH (Authentication Header) provides data origin authentication,
data integrity and anti-replay services.
ESP: ESP (Encapsulating Security Payload) provides data encryption
in addition to origin authentication, data integrity, and anti-replay
services.
AH Authentication:
Select the algorithm use
d to verify the integrity of the data for AH
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary
length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorithm) takes a message less than
2^64 (64th power of 2) in bits and generates a 160-bit message digest.
ESP
Authentication:
Select the algorithm used to verify the integrity of the data for ESP
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary
length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorith
m) takes a message less than
2^64 (64th power of 2) in bits and generates a 160-bit message digest.
ESP Encryption:
Select the algorithm used to encrypt the data for ESP encryption. Options
include:
NONE: Performs no encryption.
DES: DES (Data Encryption Standard) encrypts a 64-bit block of plain text
with a 56-bit key. The key should be 8 characters.
3DES: Triple DES, encrypts a plain text with 168-bit key. The key should be
24 characters.
AES128: Uses the AES algorithm and 128-bit key for encryption. The key
should be 16 characters.
AES192: Uses the AES algorithm and 192-bit key for encryption. The key
should be 24 characters.
AES256: Uses the AES algorithm and 256-bit key for encryption. The key
should be 32 characters.
List of IPsec Proposal
In this table, you can view the information of IPsec Proposals and edit them by the action buttons.
-99-