68-22
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter68 Configuring IKE, Load Balancing, and NAC
Configuring IPsec
14-32
Add/Edit IPsec Proposal
Use this pane to add or modify an IPsec IKEv2 proposal. A proposal is a set of operations done on a data
flow to provide data authentication, data confidentiality, and data compression. For example, one
proposal is the ESP protocol with 3DES encryption and the HMAC-MD5 authentication algorithm
(ESP-3DES-MD5).
Fields
Name—Specifies a name for this proposal.
Encryption—Choose the Encapsulating Security Protocol (ESP) encryption algorithms for the
proposal. ESP provides data privacy services, optional data authentication, and anti-replay services.
ESP encapsulates the data being protected.
Integrity Hash—Choose the ESP authentication algorithms for the proposal. The hash algorithm
ensures data integrity for the ESP protocol. It ensures that a packet comes from whom you think it
comes from, and that it has not been modified in transit.
Note The IPsec ESP (Encapsulating Security Payload) protocol provides both encryption and
authentication. Packet authentication proves that data comes from whom you think it comes
from; it is often referred to as “data integrity.”
Modes
The following table shows the modes in which this feature is available:
14-32
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
——