-92-
Figure 3-61 IPsec Proposal
The following items are displayed on this screen:
IPsec Proposal
Proposal Name: Specify a unique name to the IPsec Proposal for identification and
management purposes. The IPsec proposal can be applied to IPsec
policy.
Security Protocol: Select the security protocol to be used. Options include:
AH: AH (Authentication Header) provides data origin
authentication, data integrity and anti-replay services.
ESP: ESP (Encapsulating Security Payload) provides data
encryption in addition to origin authentication, data integrity, and
anti-replay services.
AH Authentication: Select the algorithm used to verify the integrity of the data for AH
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA: SHA (Secure Hash Algorithm) takes a message less than the
64th power of 2 in bits and generates a 160-bit message digest.