Efficient Networks® 5800 Series
User Reference Guide
Chapter 3: Additional Features
Efficient Networks®Page 3-25
1. IKE Proposal Name: Enter a logical name for the IKE Proposal
Definition. This name is of no importance to the remote IKE peer.
2. Message Authentication Scheme: Select the message authentication
scheme from two possible message authentication proposals:
MD5: Perform message authentication using Message Digest 5.
SHA1: Perform message authentication using Secure Hashing
Algorithm 1 (default).
3. Diffie-Hellman (O akley) Group: Select the Diffie-Hellman key
generation group from two Diffie-Hellman Group optio ns:
Group 1: Use Diffie-Hellman Group 1 (768 bits).
Group 2: Use Diffie-Hellman Group 2 (1024 bits).
4. Encryption Type: Select the type of encryption to be proposed:
DES: Encrypt using a 56-bit key.
3DES: Encrypt using three 56-bit keys to produce 168-bit
encryption.
5. Phase 1 Proposal Lifetime: Select the duration of this proposal, as
measured in seconds. The default setting is 86400 seconds (24 hours).
Once this lifetime is elapsed, your router will renegotiate the IKE
connection.