3.57. IKEAlgorithms
Description
Configure algorithms which are used in the IKE phase of an IPsec session.
Properties
Name
Specifies
a
symbolic
name
for
the
object.
(Identifier)
DESEnabled
Enable DES encryption algorithm. (Default: No)
DES3Enabled
Enable 3DES encryption algorithm. (Default: No)
AESEnabled
Enable AES encryption algorithm. (Default: No)
BlowfishEnabled
Enable Blowfish encryption algorithm. (Default:
No)
TwofishEnabled
Enable Twofish encryption algorithm. (Default: No)
CAST128Enabled
Enable CAST128 encryption algorithm. (Default:
No)
BlowfishMinKeySize
Specifies the minimum Blowfish key size in bits.
(Default: 128)
BlowfishKeySize
Specifies the Blowfish preferred key size in bits.
(Default: 128)
BlowfishMaxKeySize
Specifies the maximum Blowfish key size in bits.
(Default: 448)
TwofishMinKeySize
Specifies the minimum Twofish key size in bits.
(Default: 128)
TwofishKeySize
Specifies the Twofish preferred key size in bits.
(Default: 128)
TwofishMaxKeySize
Specifies the maximum Twofish key size in bits.
(Default: 256)
AESMinKeySize
Specifies the minimum AES key size in bits.
(Default: 128)
AESKeySize
Specifies the preferred AES key size in bits.
(Default: 128)
AESMaxKeySize
Specifies the maximum AES key size in bits.
(Default: 256)
MD5Enabled
Enable MD5 integrity algorithm. (Default: No)
SHA1Enabled
Enable SHA1 integrity algorithm. (Default: No)
SHA256Enabled
Enable SHA256 integrity algorithm. (Default: No)
SHA512Enabled
Enable SHA512 integrity algorithm. (Default: No)
Chapter 3: Configuration Reference
196
Summary of Contents for NetDefend DFL-260E
Page 21: ...Chapter 1 Introduction 21...
Page 104: ...Chapter 2 Command Reference 104...
Page 240: ...Comments Text describing the current object Optional Chapter 3 Configuration Reference 240...
Page 317: ...Comments Text describing the current object Optional Chapter 3 Configuration Reference 317...