Nokia IP265 Security Guide - Page 37

When Check Point VPN-1 NGX R60 is used, additional Diffie-Hellman groups

Page 37 highlights

Notes: Figure 6 - Only FIPS-Approved Algorithms Can Be Used with IKE 1. Only Diffie-Hellman Groups 2 or higher (1024-bits), providing 80 or more bits of encryption strength should be used in the FIPS approved mode of operation. 2. When Check Point VPN-1 NGX (R60) is used, additional Diffie-Hellman groups 15-18 (2048 bits to 8192 bits) are selectable as options. © Copyright 2005, 2006, 2007 Nokia Page 37 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43

Figure 6 – Only FIPS-Approved Algorithms Can Be Used with IKE
Notes:
1. Only Diffie-Hellman Groups 2 or higher (1024-bits), providing 80 or more bits of
encryption strength should be used in the FIPS approved mode of operation.
2. When Check Point VPN-1 NGX (R60) is used, additional Diffie-Hellman groups
15-18 (2048 bits to 8192 bits) are selectable as options.
© Copyright 2005, 2006, 2007
Nokia
Page 37 of 43
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.