beautypg.com

Ikealgorithms – Amer Networks E5 CLI User Manual

Page 170

background image

3.53. IKEAlgorithms

Description

Configure algorithms which are used in the IKE phase of an IPsec session.

Properties

Name

Specifies

a

symbolic

name

for

the

object.

(Identifier)

DESEnabled

Enable DES encryption algorithm. (Default: No)

DES3Enabled

Enable 3DES encryption algorithm. (Default: No)

AESEnabled

Enable AES encryption algorithm. (Default: No)

BlowfishEnabled

Enable Blowfish encryption algorithm. (Default:
No)

TwofishEnabled

Enable Twofish encryption algorithm. (Default: No)

CAST128Enabled

Enable CAST128 encryption algorithm. (Default:
No)

BlowfishMinKeySize

Specifies the minimum Blowfish key size in bits.
(Default: 128)

BlowfishKeySize

Specifies the Blowfish preferred key size in bits.
(Default: 128)

BlowfishMaxKeySize

Specifies the maximum Blowfish key size in bits.
(Default: 448)

TwofishMinKeySize

Specifies the minimum Twofish key size in bits.
(Default: 128)

TwofishKeySize

Specifies the Twofish preferred key size in bits.
(Default: 128)

TwofishMaxKeySize

Specifies the maximum Twofish key size in bits.
(Default: 256)

AESMinKeySize

Specifies the minimum AES key size in bits.
(Default: 128)

AESKeySize

Specifies the preferred AES key size in bits.
(Default: 128)

AESMaxKeySize

Specifies the maximum AES key size in bits.
(Default: 256)

MD5Enabled

Enable MD5 integrity algorithm. (Default: No)

SHA1Enabled

Enable SHA1 integrity algorithm. (Default: No)

XCBCEnabled

Enable XCBC-AES integrity algorithm. (Default: No)

Comments

Text describing the current object. (Optional)

Chapter 3: Configuration Reference

170

This manual is related to the following products: