Nortel Secure 4134 Configuration page 127

Security — configuration and management
Hide thumbs Also See for Secure 4134:
Table of Contents

Advertisement

Configuring hash algorithm
Configure the IKE authentication algorithm for a given proposal.
Procedure steps
Step
1
2
3
4
5
Table 53
Variable definitions
Variable
md5
sha1
[no]
Configuring lifetime
Configure the lifetime of the IKE SA. When the SA expires, it is replaced by
a new negotiated SA or terminated.
Procedure steps
Step
1
2
Copyright © 2007, Nortel Networks
.
Action
To enter the configuration mode, enter:
configure terminal
To specify crypto configuration for IPsec and IKE, enter:
crypto
To specify the IKE policy to configure, enter:
ike policy <policy-name> <peer-address>
To select the IKE proposal to configure, enter:
proposal <priority>
To configure the hash algorithm, enter:
[no] hash-algorithm {md5|sha1}
Value
Specifies a 128-bit message digest (RFC 1321).
Specifies Secure Hash Standard, a 160-bit message
digest (NIST,FIPS PUB 180-1).
Sets the hash algorithm to the default value (sha1).
Action
To enter the configuration mode, enter:
configure terminal
To specify crypto configuration for IPsec and IKE, enter:
Nortel Secure Router 4134
Security — Configuration and Management
NN47263-600 01.02 Standard
10.0 3 August 2007
Configuring IKE for site-to-site VPN 127
—End—

Advertisement

Table of Contents
loading

Table of Contents