7
IPsec VPN
126
Supported algorithms
The
algorithms
currently
supported
by
the
SEG
are:
•
Encryption
algorithms:
AES128
‐
CBC
AES192
‐
CBC
AES256
‐
CBC
3DES
Null
•
Data
integrity
algorithms:
SHA1
MD5
AES
‐
XCBC
•
Pseudo
‐
random
function
algorithms:
This
is
the
same
list
as
for
data
integrity
algorithms
above.
SEG algorithm sets
In
the
SEG,
the
various
encryption
and
integrity
algorithms
are
grouped
together
into
sets
according
to
the
level
of
security
they
provide.
These
sets,
called
high
,
low
and
all
,
are
then
used
in
the
pre
‐
defined
IKE
and
IPsec
proposal
lists.
The
sets
are
as
follows:
•
High
This
consists
of
a
set
of
algorithms
to
give
higher
security.
This
is
the
default
algorithm
set
for
an
IPsec
tunnel
if
no
proposal
lists
are
explicitly
set.
The
complete
list
is:
1.
3DES
and
AES256
‐
CBC
for
encryption.
2.
MD5
and
SHA1
for
integrity.
•
Low
This
set
gives
slightly
less
security.
The
complete
list
is:
1.
3DES
and
AES128
‐
CBC
for
encryption.
2.
MD5
and
SHA1
for
integrity.
•
All
This
set
combines
all
available
algorithms.