The Integrity tab enables you to configure checksumming for the authentication methods. Checksumming is the comparison of data sent over the connection as seen by both client and server.
![]() | Note: Use the SSL tab to configure Cipher Suites for the Secure Sockets Layer (SSL).
|
Click either the Server or Client check box to indicate whether the machine you are currently configuring is a Client or a Server. The Server option does not apply to the servers to which this machine connects.
Checksum Level
Click the list to select a checksum level. The four possible checksum levels are:
Accepted
| Service will be active if the other side of the connection specifies either
"required" or "requested", and there is a compatible algorithm available on the
other side; it will otherwise be inactive.
|
Rejected
| Service must not be active, and the connection will fail if the other side
specifies "required".
|
Requested
| Service will be active if the other side of the connection specifies either
"accepted", "required", or "requested", and there is a compatible algorithm
available on the other side; it will otherwise be inactive.
|
Required
| Service must be active, and the connection will fail if the other side
specifies "rejected", or if there is no compatible algorithm on the other side.
|