Virtual Private Network > Connections
Virtual Private Network
220
RM GUI HiSecOS EAGLE20/30
Release
3.0
09/2015
IKE Key
agreement
Specifies which Diffie-Hellman key agreement algorithm the device uses for
establishing the IKE-SA session key establishment.
Possible values:
any
The device accepts every algorithm when specified as the responder.
modp1024
(default setting)
1024 bits modulus which is DH Group 2.
modp1536
1536 bits modulus which is DH Group 5.
modp2048
2048 bits modulus which is DH Group 14.
modp3072
3072 bits modulus which is DH Group 15.
modp4096
4096 bits modulus which is DH Group 16.
IKE Integrity
(MAC)
Specifies which IKEv2 Integrity (MAC) algorithm the device uses.
In order to help keep the information on the VPN secure, the Hash-based
Message Authentication Code (HMAC) process mixes (hashes) a shared
secret key with the message data. The device mixes the results (hash
value) with the secret key again, and then applies the hash function a
second time.
Possible values:
any
With this value selected the device accepts every algorithm when
specified as the responder and uses various pre-defined algorithms
when specified as the initiator.
hmacmd5
The device uses the Message Digest Algorithm 5 (MD5) for the hash
function calculation.
hmacsha1
(default setting)
The device uses the Secure Hash Algorithm version 1 (SHA-1) for the
hash function calculation.
hmacsha256
The device uses SHA-256, part of the version 2 family, for the hash
function calculation which the device computes with 32-bit words.
hmacsha384
The device uses SHA-384, part of the version 2 family, for hash function
calculation which the device computes using a shorter version of SHA-
512.
hmacsha512
The device uses SHA-512, part of the version 2 family, for hash function
calculation which the device computes with 64 bit words.
Parameters Meaning