HP X Unified Security Platform Series Manual de usuario Pagina 218

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 333
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 217
Chapter 7 VPN
202 X Family LSM User’s Guide V 2.5.1
IKE Proposal Configuration Parameters: Phase 1 and 2
The following table describe the IKE Phase 1 and Phase 2 Configuration parameters. To review the
parameter descriptions for each set, see the following links:
IKE Phase 1 Setup:” on page 202
IKE Phase 2 Setup:” on page 205
Table 7–5: IKE Proposal Phase 1 and Phase 2 Configuration Parameters
Parameter Description
IKE Phase 1 Setup:
Specify the parameters the X family device uses to negotiate Phase 1 of the IKE to establish a shared,
secure connection. Phase 1 uses Aggressive Mode or Main Mode for packet exchange. The default is
Main Mode.
Proposal Name Specifies a name for the IKE proposal. When you configure an IPSec Security
Association, this name is used to select the IKE proposal to be used with the SA.
Encryption &
Integrity
Encryption and Integrity work in combination to provide the degree of security
required. Recommended combinations for IKE Phase 1 and IKE Phase 2 are
listed below in order from least secure to most secure.
DES-CBC encryption with MD5 or SHA1 integrity (not recommended)
The following combinations are recommended combinations for IKE Phase 1:
DES-CBC encryption with MD5 or SHA1 integrity
3DES-CBC (strong encryption device only) with MD5 or SHA1 integrity
AES-CBC-128 (strong encryption device only) with SHA1 integrity
AES-CBC-192 (strong encryption device only) with SHA1 integrity
AES-CBC-256 (strong encryption device only) with SHA1 integrity
DES should only be used if it is supported on the remote device(s)
Note The strong encryption options are only available if the device is
configured with strong encryption. To enable strong encryption functionality
(3DES, 128-AES, 192-AES, 256-AES), install the correct Strong Encryption
Service Pack for your device available from the TMC Web site.
Diffie Hellman
Group
Diffie-Hellman is the protocol used to establish shared security, in order to
prevent unauthorized access to the key negotiation. The higher the Diffie-
Hellman Group number, the more secure the connection. For interoperability or
export restrictions, you may need to select a lower group number. Supported
groups are:
1 (768 bits) - This setting is not recommended
2 (1024 bits)
5 (1536 bits) (High encryption device only)
Vista de pagina 217
1 2 ... 213 214 215 216 217 218 219 220 221 222 223 ... 332 333

Comentarios a estos manuales

Sin comentarios