ESP Authentication: Select the algorithm used to verify the integrity of the data for ESP authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a
SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a
ESP Encryption: Select the algorithm used to encrypt the data for ESP encryption. Options include:
NONE: Performs no encryption.
DES: DES (Data Encryption Standard) encrypts a
3DES: Triple DES, encrypts a plain text with
AES128: Uses the AES algorithm and
List of IPsec Proposal
In this table, you can view the information of IPsec Proposals and edit them by the action buttons.
3.5.2.3IPsec SA
This page displays the information of the IPsec SA (Security Association).
Choose the menu VPN→IPsec→IPsec SA to load the following page.
Figure
Figure
As Security Association is unidirectional, an ingoing SA and an outgoing SA are created to protect data flows for each tunnel after IPsec tunnel is successfully established. The ingoing SPI value and