Chapter 6 - Basic Configuration Guide 39
will only initiate tunnel establishment attempts and will not
respond to them.
If Respond is selected, this Tunnel Partner will use IKE, but
will only respond to tunnel establishment attempts and will not
initiate them.
B. Enter the Shared Key. This is a shared alphanumeric secret
that is used to generate session keys.
C. Select the authentication and encryption algorithms to be used
for tunnel sessions using the IKE Configuration Transform lis t
box.
Click on the Add... button in the Transform section to access
the IKE Configuration Transform List dialog box.
IKE Configuration Transform List
The default settings of MD5 for Authentication and DES for
Encryption are adequate for most setups. Click OK.
D. In the IKE Key Management dialog box, you may click on the
PFS checkbox to add additional security parameters during
tunnel sessions. (This is optional.)
v Note: For more information regarding encryption, authentication,
and Perfect Forward Secrecy, refer to the CompatiView Management
Software Reference Guide.
E. Click OK.