-86-
DPD Interval: Enter the interval after which the DPD is triggered.
List of IKE Policy
In this table, you can view the information of IKE Policies and edit them by the action buttons.
3.5.1.2 IKE Proposal
On this page, you can define and edit the IKE Proposal.
Choose the menu VPNIKEIKE Proposal to load the following page.
Figure 3-59 IKE Proposal
The following items are displayed on this screen:
IKE Proposal
Proposal Name: Specify a unique name to the IKE proposal for identification and
management purposes. The IKE proposal can be applied to IPsec
proposal.
Authentication: Select the authentication algorithm for IKE negotiation. Options
include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA1: SHA1 (Secure Hash Algorithm) takes a message less
than 2^64 (the 64th power of 2) in bits and generates a
160-bit message digest.