Chapter 5
Setup and Configuration
Where:
• connection is the name of the connection
• cipher is the cipher algorithm
• method is the hash method
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
3.
Section 5.29.8.4
Deleting ESP Algorithms
To delete an algorithm for the Encapsulated Security Payload (ESP) protocol, do the following:
1.
Make sure the CLI is in Configuration mode.
2.
Delete the algorithm by typing:
no tunnel ipsec connection connection esp algorithm cipher cipher hash method
Where:
• connection is the name of the connection
• cipher is the cipher algorithm
• method is the hash method
Type commit and press Enter to save the changes, or type revert and press Enter to abort.
3.
Section 5.29.9
Configuring the Connection Ends
Each IPsec tunnel has two ends: the local router and the remote router. These are otherwise referred to as the
left and right connections, respectively. Both ends can have the same configuration or a unique configuration.
To configure a connection end for an IPsec tunnel, do the following:
1.
Make sure the CLI is in Configuration mode.
2.
Navigate to tunnel » ipsec » connection » {name} » {end}, where {name} is the name of the connection
and {end} is the either the left (local router) or right (remote router) connection end.
3.
Configure the public IP address by configuring the following parameters:
Parameter
type { type }
value { value }
4.
Configure the system public key by configuring the following parameters:
Parameter
type { type }
470
Description
Synopsis: { none, default-route, any, address, hostname }
Default: none
The public IP address type.
Synopsis: A string 1 to 4095 characters long
The public hostname or IP address.
Description
Synopsis: { none, rsasig, certificate-any, certificate }
RUGGEDCOM ROX II
CLI User Guide
Deleting ESP Algorithms