Advanced Security Option: Integrity

The Integrity tab allows you to configure checksumming for the authentication methods. Checksumming is the comparison of data sent over the connection as seen by both client and server.

Note: Use the SSL tab to configure Cipher Suites for the Secure Sockets Layer (SSL).

Server/Client

Click either the Server or Client option for the machine you are currently configuring. The Server option is used if the machine being configured is acting as a server. It does not apply to the servers that this machine is connecting to.

Checksum Level

From the drop-down list, select the checksum level:

Accepted
Service will be active if the other side of the connection specifies either "required" or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive.
Rejected:


Service must not be active, and the connection will fail if the other side specifies "required".


Requested:


Service will be active if the other side of the connection specifies either "accepted", "required", or "requested", and there is a compatible algorithm available on the other side; it will otherwise be inactive.


Required:


Service must be active, and the connection will fail if the other side specifies "rejected", or if there is no compatible algorithm on the other side.