IKEv1 Phase 1 (Authentication)
Use IKE to create security associations dynamically. Configure SA parameters for authentication and to securely generate IPsec session keys for encryption and authentication algorithms. Items on this page are described in the following table.
IKE Phase 1 (Authentication) page
|
|
|
(Required) IKE provides two modes of negotiation during an exchange for keys and security services to be used for a Security Association:
|
Main Uses identity protection between the hosts. This method is slower but secure.
|
Aggressive Uses half the message exchanges. It is faster, but less secure.
|
|
|
(Required) Diffie-Hellman Groups Allows a secret key and security services to be securely exchanged between two hosts over an unprotected network. A Diffie-Hellman group determines the parameters to use during a Diffie-Hellman exchange. Multiple well-known Diffie-Hellman groups are listed. To change the entries in the list, click Edit. Selecting all the groups results in a single negotiated group.
|
|
Encryption and Authentication
|
|
(Required) Encryption methods and strengths, and the authentication methods to use.
|
Selecting all the methods results in a single negotiated method.
|
|
|
|
HP Jetdirect Print Servers IKEv1 Phase 1 (Authentication)