-88-
Proposal Name:
to the IPsec Proposal for identification and
ec proposal can be applied to IPsec
Security Protocol:
Select the security protocol to be used. Options include:
uthentication Header) provides data origin
authentication, data integrity and anti-replay services.
ting Security Payload) provides data
encryption in addition to origin authentication, data integrity, and
anti-replay services.
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
es age digest.
message less than the
64th power of 2 in bits and generates a 160-bit message digest.
ESP Authentication:
Select the algorithm used to verify the integrity of the data for ESP
authentication. Options include:
MD5: MD5 (Message Digest Algorithm) takes a message of
arbitrary length and generates a 128-bit message digest.
SHA: S
rithm) takes a message less than the
IPsec Proposal
Specify a unique name
management purposes. The IPs
policy.
AH: AH (A
ESP: ESP (Encapsula
AH Authentication:
Select the algorithm used to verify the integrity of the data for AH
arbitrary length and generates a 128-bit m s
SHA: SHA (Secure Hash Algorithm) takes a
HA (Secure Hash Algo
64th power of 2 in bits and generates a 160-bit message digest.