
Efficient Networks® 5800 Series
User Reference Guide
Chapter 3: Additional Features
Efficient Networks®Page3-19
1. IKE Proposal Name:  Enter a logical name for the IKE Proposal 
Definition.  This name is of no importance to the remote IKE peer.
2. Message Authentication Scheme:  Select the message authentication 
scheme from two possible message authentication proposals:
–MD5:  Perform message authentication using Message Digest 5.
–SHA1:  Perform message authentication using Secure Hashing 
Algorithm 1 (default).
3. Diffie-Hellman (Oakley) Group:  Select the Diffie-Hellman key 
generation group from two Diffie-Hellman Group options:
–Group 1:  Use Diffie-Hellman Group 1 (768 bits).
–Group 2:  Use Diffie-Hellman Group 2 (1024 bits).
4. Encryption Type:  Select the type of encryption to be proposed:
–DES:  Encrypt using a 56-bit key.
–3DES:  Encrypt using three 56-bit keys to produce 168-bit 
encryption.
5. Phase 1 Proposal Lifetime:  Select the duration of this proposal, as 
measured in seconds.  The default setting is 86400 seconds (24 hours).  
Once this lifetime is elapsed, your router will renegotiate the IKE 
connection.