Nokia IP265 Security Guide - Page 37
When Check Point VPN-1 NGX R60 is used, additional Diffie-Hellman groups
View all Nokia IP265 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 37 highlights
Notes: Figure 6 - Only FIPS-Approved Algorithms Can Be Used with IKE 1. Only Diffie-Hellman Groups 2 or higher (1024-bits), providing 80 or more bits of encryption strength should be used in the FIPS approved mode of operation. 2. When Check Point VPN-1 NGX (R60) is used, additional Diffie-Hellman groups 15-18 (2048 bits to 8192 bits) are selectable as options. © Copyright 2005, 2006, 2007 Nokia Page 37 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Figure 6 – Only FIPS-Approved Algorithms Can Be Used with IKE
Notes:
1. Only Diffie-Hellman Groups 2 or higher (1024-bits), providing 80 or more bits of
encryption strength should be used in the FIPS approved mode of operation.
2. When Check Point VPN-1 NGX (R60) is used, additional Diffie-Hellman groups
15-18 (2048 bits to 8192 bits) are selectable as options.
© Copyright 2005, 2006, 2007
Nokia
Page 37 of 43
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.