Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 370

Summit wm3000 series controller system software version 4.0

Advertisement

Controller Security
its policies to the remote peer. The remote peer searches for a match with its own policies using the
defined priority scheme.
A IKE policy matches when they have the same encryption, hash, authentication and Diffie-Hellman
settings. The SA lifetime must also be less than or equal to the lifetime in the policy sent. If the lifetimes
do not match, the shorter lifetime applies. If no match exists, IKE refuses negotiation.
To view the current set of IKE policies:
1 Select Security > IKE Settings from the main menu tree.
2 Click the IKE Policies tab.
3 Refer to the values displayed within the IKE Policies tab to determine if an existing policy requires
revision, removal or a new policy requires creation.
Sequence Number
Encryption
370
Displays the sequence number for the IKE policy. The available range is
from 1 to 10,000, with 1 being the highest priority value.
Displays the encryption method protecting data transmitted between
peers. Options include:
DES 56-bit DES-CBC
. The default value.
3DES
- 168-bit Triple DES.
AES
- 128-bit AES.
AES 192
- 192-bit AES.
AES 256
- 256-bit AES.
Summit WM3000 Series Controller System Reference Guide

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700