MD5 is the only data integrity method applicable to the IKE scheme. True or false?
A.
True
B.
False
Explanation:
: In this case we need a feature of network security known as “Integrity”, we need to be sure that
the data has not changed from the source to the destination, this could be achieved through the
use of digital signatures, Checkpoint provides support for the following algorithms in combination
with IKE VPN´s: MD5 and SHA-1. Those can provide data integrity. See the properties of you IKE
VPN for the configuration of this options.