Motorola WiNG 5 System Reference Manual page 157

Table of Contents

Advertisement

IKE LifeTime
8. Select
+ Add Row
to define the network address of a target peer and its security settings.
Name
DH Group
Encryption
Authentication
9. Select
OK
to save the changes made within the IKE Policy screen. Select
configuration. Select the Delete Row icon as needed to remove a peer configuration.
10. Select the
Peer Configuration
tunnel peer destination.
Set the lifetime defining how long a connection (encryption/authentication
keys) should last from successful key negotiation to expiration. Set this value
in either Seconds (600 - 86,400), Minutes (10 - 1,440), Hours (1 - 24) or Days
(1). This setting is required for both IKEv1 and IKEV2.
If creating a new IKE policy, assign the target peer (tunnel destination) a 32
character maximum name to distinguish it from others with a similar
configuration.
Use the drop-down menu to define a Diffie-Hellman (DH) identifier used by
the VPN peers to derive a shared secret password without having to transmit.
Options include 2, 5 and 14. The default setting is 5.
Select an encryption method used by the tunnelled peers to securely
interoperate. Options include 3DES, AES, AES-192 and AES-256. The default
setting is AES-256.
Select an authentication hash algorithm used by the peers to exchange
credential information. Options include SHA and MD5. The default setting is
SHA.
tab to assign additional network address and IKE settings to the an intended VPN
Device Configuration 5 - 97
Reset
to revert to the last saved

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents