148 IPsec VPN configuration
4
5
6
Table 72
Variable definitions
Variable
group1
group2
group5
Configuring encryption algorithm for IKE proposal for remote
access VPN
Configure the encryption algorithm for the remote access IKE proposal.
Procedure steps
Step
1
2
3
4
5
6
Copyright © 2007, Nortel Networks
.
To specify the remote access IKE policy to configure, enter:
ike policy <policy-name> {modecfg-group | l2tp-group}
To specify the IKE proposal, enter:
proposal <1-5>
To configure DH group for IKE proposal
dh-group {group1 | group2 | group5}
Value
768-bit. RFC 2409.
1024-bit. RFC 2409.
1536-bit. RFC2409. This is the highest level of
security and requires more processing time than
group 1 and group 2.
Action
To enter the configuration mode, enter:
configure terminal
To specify crypto configuration for IPsec and IKE, enter:
crypto
To specify configuration of remote access IKE policies, enter:
dynamic
To specify the remote access IKE policy to configure, enter:
ike policy <policy-name> {modecfg-group | l2tp-group}
To specify the IKE proposal, enter:
proposal <1-5>
To configure the encryption algorithm for IKE:
Nortel Secure Router 4134
Security — Configuration and Management
NN47263-600 01.02 Standard
10.0 3 August 2007
—End—