beautypg.com

Figure 5 – H3C Technologies H3C SecPath F1000-E User Manual

Page 703

background image

6

Figure 5 Add an IKE proposal

Table 3

describes the configuration items for creating an IKE proposal.

Table 3 IKE proposal configuration items.

Item

Description

IKE Proposal
Number

Type the IKE proposal number.
The number also stands for the priority of the IKE proposal, with a smaller value meaning
a higher priority. During IKE negotiation, the system matches IKE proposals in order of

proposal number, starting from the smallest one.

Authentication
Method

Select the authentication method to be used by the IKE proposal.
Preshared Key: Uses the pre-shared key method.
RSA Signature: Uses the RSA digital signature method.

Authentication
Algorithm

Select the authentication algorithm to be used by the IKE proposal.
SHA1: Uses HMAC-SHA1.
MD5: Uses HMAC-MD5.

Encryption
Algorithm

Select the encryption algorithm to be used by the IKE proposal.
DES-CBC: Uses the DES algorithm in CBC mode and 56-bit keys for encryption.
3DES-CBC: Uses the 3DES algorithm in CBC mode and 168-bit keys for encryption.
AES-128: Uses the AES algorithm in CBC mode and 128-bit keys for encryption.
AES-192: Uses the AES algorithm in CBC mode and 192-bit keys for encryption.
AES-256: Uses the AES algorithm in CBC mode and 256-bit keys for encryption.

DH Group

Select the DH group to be used in key negotiation phase 1.
Group1: Uses the 768-bit Diffie-Hellman group.
Group2: Uses the 1024-bit Diffie-Hellman group.
Group5: Uses the 1536-bit Diffie-Hellman group.
Group14: Uses the 2048-bit Diffie-Hellman group.

This manual is related to the following products: