Figure
The following items are displayed on this screen:
¾IPsec Proposal
Proposal Name: Specify a unique name to the IPsec Proposal for
identification and management purposes. The IPsec proposal can be applied to IPsec policy.
Security Protocol: Select the security protocol to be used. Options include:
zAH: AH (Authentication Header) provides data origin authentication, data integrity, and
zESP: ESP (Encapsulating Security Payload) provides data encryption in addition to origin authentication, data integrity, and
AH Authentication: Select the algorithm used to verify the integrity of the data for AH authentication. Options include:
zMD5: MD5 (Message Digest Algorithm) takes a message of arbitrary length and generates a
zSHA: SHA (Secure Hash Algorithm) takes a message less than the 64th power of 2 in bits and generates a
ESP Authentication: Select the algorithm used to verify the integrity of the data