Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 368

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security
During IKE negotiations, peers must identify themselves to one another. Thus, the configuration you
define is the identification medium for device recognition.
3 Set a Keep Alive interval (in seconds) the controller uses for monitoring the continued presence of a
peer and report of the client's continued presence. The client notifies you when the peer is no longer
present. The default interval is 10 seconds.
4 Click the Apply button (within the IKE Settings field) to save the configuration.
5 Click the Revert (within the IKE Settings field) to rollback to the previous configuration.
6 Refer to the Pre-shared Keys field to review the following information:
IKE Peer
Aggressive Mode
Key
NOTE
Please note that RSA keys are not supported for IKE negotiation on this controller.
7 Highlight an existing set of pre-shared Keys and click the Edit button to revise the existing peer IP
address, key and aggressive mode designation.
8 Select an existing entry and click the Delete button to remove it.
368
Use this address to associate an IP address with the specific tunnel used
by a group of peers.
Displays whether aggressive mode is enabled for this IP address and key
string. A green check mark defines aggressive mode as enabled. A red
"X" denotes the mode as disabled.
Displays the string ID a remote peer uses to look up pre-shared keys.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700