Security Protocol: Select the security protocol to be used. Options include:
AH: AH (Authentication Header) provides data origin authentication, data integrity and
ESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and
AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a
SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a
ESP Authentication: Select the algorithm used to verify the integrity of the data for ESP authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a
SHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a
ESP Encryption: Select the algorithm used to encrypt the data for ESP encryption. Options include:
NONE: Performs no encryption.
DES: DES (Data Encryption Standard) encrypts a
3DES: Triple DES, encrypts a plain text with
AES128: Uses the AES algorithm and
List of IPsec Proposal
In this table, you can view the information of IPsec Proposals and edit them by the action buttons.