ELSA Documentation


VPN and Filtering

VPN

IKE Proposals

On this page the IKE proposal lists can be configured.
Proposal List Name
Enter the name of the IKE proposal list.
Time Limit 
Enter the time limit of your IKE keys.
PFS Group 
Enter the Diffie-Hellman group number used for perfect forward secrecy.
Enable Proposal 1,2,3
Enable IKE proposal.
Proposal 1,2,3 Cipher
Select the cipher algorithm you would like to use to encrypt and decrypt your data.
Proposal 1,2,3 Hash
Select the hash algorithm you would like to use to authenticate your data.
Proposal 1,2,3 Group   
Select the Diffie-Hellman group you would like to use for the secret key.


© Copyright 2002, ELSA AG
http://www.elsa.de/