3Com 3032 Configuration Manual page 592

3com 3032: user guide
Hide thumbs Also See for 3032:
Table of Contents

Advertisement

588
C
41: C
HAPTER
ONFIGURING
IKE features
Configuring IKE
Creating an IKE Security
Policy
IKE
Figure 176 Diagram of relationship between IKE and IPSec
IKE
Router A
TCP/UDP
SA
IPSec
Encrypted IP message
Avoid specifying manually all IPSec security parameters in password mapping of
both communication ends.
Allow specifying the lifetime of IPSec SA
Allow exchanging ciphering key during IPSec session
Can provide anti-replay service by IPSec
Allow manageable and scalable IPSec to implement certificate authorization
support.
Allow dynamic end-to-end authentication.
IKE configuration includes:
Creating an IKE Security Policy
Selecting an Encryption Algorithm
Selecting an Authentication Algorithm
Configuring Pre-shared Key
Selecting the Hashing Algorithm
Selecting DH Group ID
Setting the Lifetime of IKE Association SA
Configuring IKE Keepalive Timer
IKE negotiation determines whether IKE policies at both ends are matched and
then reach a negotiation using an IKE policy. During the subsequent negotiation,
the security data provided by this IKE policy will be used to protect negotiation
data.
Multiple policies with priority must be created on each terminal to ensure that at
least one policy can match that of the remote terminal.
Encryption algorithm: At present, it includes 56-bit DES-CBC (DES-Cipher Block
Chaining) algorithm and 168-bit 3DES-CBC algorithm.
SA negotiation
IKE
SA
IP
Router B
TCP/UD
P
IPSec

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

303430333035304030413036 ... Show all

Table of Contents