SIP User's Manual
3.3.6.7
Configuring the IKE Table
The 'IKE Table' page is used to configure the Internet Key Exchange (IKE) parameters.
Note:
To configure the IKE table:
1.
Open the 'IKE Table' page (Configuration tab > Security Settings menu > IKE Table
page item).
2.
From the 'Policy Index' drop-down list, select the peer you want to edit (up to 20 peers
can be configured).
3.
Configure the IKE parameters according to the table below. Up to two IKE main mode
proposals (Encryption / Authentication / DH group combinations) can be defined. The
same proposals must be configured for all peers.
4.
Click Create
5.
To save the changes to flash memory, refer to ''
To delete a peer from the IKE table, select it from the 'Policy Index' drop-down list, click the
button Delete, and then click OK at the prompt.
Version 5.8
You can also configure the IKE table using the ini file table parameter
IPSec_IKEDB_Table (refer to ''Security Parameters''
Figure 3-58: IKE Table Page
; a row is created in the IKE table.
Saving Configuration''
93
3. Web-Based Management
on page
247
).
on page
173
October 2009
.