Advertisement
Guest User

Untitled

a guest
Jun 4th, 2014
231
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.63 KB | None | 0 0
  1. Key management Pre-shared
  2. Encryption algorithm AES-256
  3. Hash algorithm SHA-1
  4. Diffie-Hellman group 2
  5. Key lifetime in seconds 86400
  6. PHASE II
  7. Encryption algorithm ESP-AES-256
  8. Authentication algorithm SHA-HMAC
  9. Perfect Forward Secrecy 2
  10. Security association lifetime in seconds 28800
  11.  
  12. CRYPTO ACCESS RULES
  13. Customer Comarch Protocol Description
  14. IP Netmask IP Netmask
  15. AA.BB.CC.DD 255.255.255.0 ZZ.XX.YY.WW 255.255.255.0 IP
  16.  
  17. ACCESS RULES
  18. Source IP Destination IP Protocol Port Number Description
  19. AA.BB.CC.DD ZZ.XX.YY.WW 6(tcp) 7001
  20. AA.BB.CC.DD ZZ.XX.YY.WW 6(tcp) 7001
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement