
Figure 3-63 IKE Proposal
The following items are displayed on this screen:
IKE Proposal
Proposal Name: Specify a unique name to the IKE proposal for identification and
management purposes. The IKE proposal can be applied to IPsec proposal.
Authentication: Select the authentication algorithm for IKE negotiation. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a
SHA1: SHA1 (Secure Hash Algorithm) takes a message less than 2^64 (the 64th power of 2) in bits and generates a
Encryption: Specify the encryption algorithm for IKE negotiation. Options include:
DES: DES (Data Encryption Standard) encrypts a
3DES: Triple DES, encrypts a plain text with
AES128: Uses the AES algorithm and
AES192: Uses the AES algorithm and
AES256: Uses the AES algorithm and
DH Group: Select the DH
1.The DH Group sets the strength of the algorithm in bits. Options include DH1, DH2 and DH5.