tion.
the
ore more likely to be
IKE
encryption algorithm that will be used to
encrypt the messages passed between the VPN
tunnel endpoints during the Phase 1 negotia
You can choose between DES and 3DES
encryption methods. The key length for
3DES algorithm is three times as long as the
DES key, and is theref
secure. You must choose exactly the same
Encryption algorithm on both ends of a VPN
tunnel.
P
hase 2 Proposal
Phase 2 Proposal The following entries will establish the setup
for the negotiation between the two endpoints
for the encryption of messages once the VPN
tunnel has been initiated.
PFS Mode This dro
p
-down menu allows
y
ou to s
p
ecif
y
the