Configuring A Name For The Local Security Gateway; Configuring An Ike Proposal - HP A6600 Configuration Manual

Hide thumbs Also See for A6600:
Table of Contents

Advertisement

Complete the following tasks to configure IKE:
Task

Configuring a name for the local security gateway

Configuring an IKE proposal

Configuring an IKE peer
Setting keepalive timers
Setting the NAT keepalive timer
Configuring a DPD detector
Disabling next payload field check
Configuring a name for the local security gateway
If the IKE negotiation peer uses the security gateway name as its ID to initiate IKE negotiation (that is, id-
type name or id-type user-fqdn is configured on the initiator), configure ike local-name in system view or
local-name in IKE peer view on the local router. If you configure both commands, the name configured
in IKE peer view is used.
To configure a name for the local security gateway:
To do...
1.
Enter system view.
2.
Configure a name for the
local security gateway.
Configuring an IKE proposal
An IKE proposal defines a set of attributes describing how IKE negotiation should take place. You may
create multiple IKE proposals with different preferences. The preference of an IKE proposal is
represented by its sequence number, and the lower the sequence number, the higher the preference.
Two peers must have at least one matching IKE proposal for successful IKE negotiation. During IKE
negotiation, the initiator sends its IKE proposals to the peer, and the peer searches its own IKE proposals
for a match. The search starts from the one with the lowest sequence number and proceeds in the
ascending order of sequence number until a match is found or until all the IKE proposals are found
mismatching. The matching IKE proposals are used to establish the secure tunnel.
Two matching IKE proposals have the same encryption algorithm, authentication method, authentication
algorithm, and DH group. The SA lifetime takes the smaller one of the settings on the two sides.
By default, there is an IKE proposal, which has the lowest preference and uses the default encryption
algorithm, authentication method, authentication algorithm, DH group, and ISAKMP SA lifetime.
Command...
system-view
ike local-name name
289
Remarks
Optional
Optional
Required if you want to specify an IKE
proposal for an IKE peer to reference
Required
Optional
Optional
Optional
Optional
Remarks
Optional.
By default, the device name is
used as the name of the local
security gateway.

Advertisement

Table of Contents
loading

Table of Contents