Chapter 5
Setup and Configuration
Section 5.29.7.2
Adding an IKE Algorithm
To add a new algorithm for the Internet Key Exchange (IKE) protocol, do the following:
1.
Make sure the CLI is in Configuration mode.
2.
Add the algorithm by typing:
tunnel ipsec connection connection ike algorithm cipher cipher hash method modgroup modgroup
Where:
• connection is the name of the connection
• cipher is the cipher algorithm
• method is the hash method
• modgroup is the value of the modgroup
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
3.
Section 5.29.7.3
Deleting an IKE Algorithm
To delete an algorithm for the Internet Key Exchange (IKE) protocol, do the following:
1.
Make sure the CLI is in Configuration mode.
2.
Delete the algorithm by typing:
no tunnel ipsec connection connection ike algorithm cipher cipher hash method modgroup modgroup
Where:
• connection is the name of the connection
• cipher is the cipher algorithm
• method is the hash method
• modgroup is the value of the modgroup
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
3.
Section 5.29.8
Managing the Encapsulated Security Payload (ESP) Protocol
The Encapsulated Security Payload (ESP) employed by IPsec provides encryption and authentication, making
sure that messages originated from the expected sender have not been altered in transit.
The following sections describe how to configure and manage the ESP protocol:
•
Section 5.29.8.1, "Configuring ESP Encryption"
•
Section 5.29.8.2, "Viewing a List of ESP Algorithms"
•
Section 5.29.8.3, "Adding ESP Algorithms"
•
Section 5.29.8.4, "Deleting ESP Algorithms"
468
RUGGEDCOM ROX II
CLI User Guide
Adding an IKE Algorithm