beautypg.com

Efficient Networks 5800 User Manual

Page 51

background image

Efficient Networks

®

5800 Series

User Reference Guide

Chapter 3: Additional Features

Efficient Networks

®

Page 3-19

1. IKE Proposal Name: Enter a logical name for the IKE Proposal

Definition. This name is of no importance to the remote IKE peer.

2. Message Authentication Scheme: Select the message authentication

scheme from two possible message authentication proposals:

MD5: Perform message authentication using Message Digest 5.

SHA1: Perform message authentication using Secure Hashing

Algorithm 1 (default).

3. Diffie-Hellman (Oakley) Group: Select the Diffie-Hellman key

generation group from two Diffie-Hellman Group options:

Group 1: Use Diffie-Hellman Group 1 (768 bits).

Group 2: Use Diffie-Hellman Group 2 (1024 bits).

4. Encryption Type: Select the type of encryption to be proposed:

DES: Encrypt using a 56-bit key.

3DES: Encrypt using three 56-bit keys to produce 168-bit

encryption.

5. Phase 1 Proposal Lifetime: Select the duration of this proposal, as

measured in seconds. The default setting is 86400 seconds (24 hours).

Once this lifetime is elapsed, your router will renegotiate the IKE

connection.