The Integrity tab enables you to configure data integrity for the authentication methods. Data integrity is the comparison of data sent over the connection as seen by both client and server.
| Note: Use the SSL tab to configure Cipher Suites for the Secure Sockets Layer (SSL).
|
Select either the Server or Client check box to indicate whether the computer you are currently configuring is a Client or a Server. The Server option does not apply to the servers to which this computer connects.
Checksum Level
Select a checksum level. The four possible checksum levels are:
| accepted
| Service will be active if the other side of the connection specifies either
"required" or "requested", and there is a compatible algorithm available on the
other side; it will otherwise be inactive.
|
| rejected
| Service must not be active, and the connection will fail if the other side
specifies "required".
|
| requested
| Service will be active if the other side of the connection specifies either
"accepted", "required", or "requested", and there is a compatible algorithm
available on the other side; it will otherwise be inactive.
|
| required
| Service must be active, and the connection will fail if the other side
specifies "rejected", or if there is no compatible algorithm on the other side.
|