Motorola WS5100 Series Reference Manual page 310

Hide thumbs Also See for WS5100 Series:
Table of Contents

Advertisement

6-40 WS5100 Series Switch System Reference Guide
2. Click the
Configurations
During IKE negotiations, peers must identify themselves to one another. Thus, the configuration you define is
the identification medium for device recognition.
3. Set a
Keep Alive
and report of the client's continued presence. The client notifies you when the peer is no longer present.
The default interval is 10 seconds.
4. Click the
Apply
5. Click the
Revert
6. Refer to the
Peer IP Address
Aggressive Mode
Key
NOTE: Please note that RSA keys are not supported for IKE negotiation on this switch.
7. Highlight an existing set of pre-shared Keys and click the
address, key and aggressive mode designation.
8. Select an existing entry and click the
tab.
interval (in seconds) the switch uses for monitoring the continued presence of a peer
button (within the IKE Settings field) to save the configuration.
(within the IKE Settings field) to rollback to the previous configuration.
Pre-shared Keys
field to review the following information:
Use the Peer IP Address to associate an IP address with the specific tunnel used
by a group of peers.
Displays whether aggressive mode is enabled for this IP address and key string. A
green check mark defines aggressive mode as enabled. A red "X" denotes the
mode as disabled.
Displays the string ID a remote peer uses to look up pre-shared keys.
Delete
Edit
button to revise the existing peer IP
button to remove it.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents