degrees of security and speed of negotiation:
Main Mode: Uses the automated Internet Key Exchange (IKE) setup; most secure method with the highest level of security.
Aggressive Mode: Uses the automated Internet Key Exchange (IKE) setup;
Manual Key: Standard level of security. It is the fastest of the three
methods.
Method: There are two methods of checking the authentication information, AH (Authentication Header) and ESP (Encapsulating Security Payload). Use ESP for greater security so that data will be encrypted and authenticated. AH data will be authenticated but not encrypted.
Encryption Protocol: Select the encryption method from the
DES: Stands for Data Encryption Standard. It uses a
method.
3DES: Stands for Triple Data Encryption Standard. It uses a
AES: Stands for Advanced Encryption Standard. You can use 128, 192 or 256 bits as encryption method.
Authentication Protocol: Authentication establishes data integrity and ensures it is not tampered with while in transit. There are two options: Message Digest 5 (MD5), and Secure Hash Algorithm (SHA1). While slower, SHA1 is more resistant to
MD5: A
SHA1: A
IKE Life Time: Allows you to specify the timer interval for renegotiation of the IKE security association. The value is in seconds, e.g. 28800 seconds = 8 hours.
99