The Integrity tab allows you to configure checksumming for the authentication methods. Checksumming is the comparison of data sent over the connection as seen by both client and server.
Note: Use the SSL tab to configure Cipher Suites for the Secure Sockets Layer (SSL).
Server/Client
Click either the Server or Client option for the machine you are currently configuring. The Server option is used if the machine being configured is acting as a server. It does not apply to the servers that this machine is connecting to.
Checksum Level
From the drop-down list, select the checksum level:
| Accepted
| Service will be active if the other side of the connection specifies either
"required" or "requested", and there is a compatible algorithm available on the
other side; it will otherwise be inactive.
|
| Rejected:
| Service must not be active, and the connection will fail if the other side
specifies "required".
|
| Requested:
| Service will be active if the other side of the connection specifies either
"accepted", "required", or "requested", and there is a compatible algorithm
available on the other side; it will otherwise be inactive.
|
| Required:
| Service must be active, and the connection will fail if the other side
specifies "rejected", or if there is no compatible algorithm on the other side.
|