Controller Security
During IKE negotiations, peers must identify themselves to one another. Thus, the configuration you
define is the identification medium for device recognition.
3 Set a Keep Alive interval (in seconds) the controller uses for monitoring the continued presence of a
peer and report of the client's continued presence. The client notifies you when the peer is no longer
present. The default interval is 10 seconds.
4 Click the Apply button (within the IKE Settings field) to save the configuration.
5 Click the Revert (within the IKE Settings field) to rollback to the previous configuration.
6 Refer to the Pre-shared Keys field to review the following information:
IKE Peer
Aggressive Mode
Key
NOTE
Please note that RSA keys are not supported for IKE negotiation on this controller.
7 Highlight an existing set of pre-shared Keys and click the Edit button to revise the existing peer IP
address, key and aggressive mode designation.
8 Select an existing entry and click the Delete button to remove it.
368
Use this address to associate an IP address with the specific tunnel used
by a group of peers.
Displays whether aggressive mode is enabled for this IP address and key
string. A green check mark defines aggressive mode as enabled. A red
"X" denotes the mode as disabled.
Displays the string ID a remote peer uses to look up pre-shared keys.
Summit WM3000 Series Controller System Reference Guide