Configuring IKE Policies

ArubaOS contains several predefined default IKE policies, as described in Table 79. If you do not want to use any of these predefined policies, you can use the procedures below to edit an existing policy or create your own custom IKE policy instead.

NOTE: The IKE policy selections need to be reflected in the VPN client configuration. When using a third-party VPN client, set the VPN configuration on clients to match the choices made above. In case the Dell dialer is used, these configuration need to be made on the dialer prior to downloading the dialer onto the local client

1.Scroll down to the IKE Policies section of the IPSEC tab, then click Edit to edit an existing policy or click Add to create a new policy.

2.Enter a number into the Priority field to set the priority for this policy. Enter a priority to 1 for the configuration to take priority over the Default setting.

3.Select the IKE version. Click the Version drop-down list and select V2 for IKEv2.

4.Set the Encryption type. Click the Encryption drop-down list and select one of the following encryption types. DES

3DES AES128 AES192 AES256

5.Set the HASH function. Click the Hash drop-down list and select one of the following hash types. MD5

SHA

SHA1-96

SHA2-256-128 SHA2-384-192

6.ArubaOS VPNs support IKEv2 client authentication using RSA digital certificates, or Elliptic Curve Digital Signature Algorithm (ECDSA) certificates. To set the authentication type for the IKE rule, click the Authentication drop-down list and select one of the following types:

RSA

ECDSA-256 ECDSA-384

7.Diffie-Hellman is a key agreement algorithm that allows two parties to agree upon a shared secret, and is used within IKE to securely establish session keys. To set the Diffie Hellman Group for the ISAKMP policy, click the Diffie Hellman Group drop-down list and select one of the following groups:

Group 1: 768-bit Diffie Hellman prime modulus group.

Group 2: 1024-bit Diffie Hellman prime modulus group.

Group 19: 256-bit random Diffie Hellman ECP modulus group.

Group 20: 384-bit random Diffie Hellman ECP modulus group.

8.Set the Pseudo-Random Function (PRF) value. This algorithm is an HMAC function to used to hash certain values during the key exchange.

PRF-HMAC-MD5 PRF-HMAC-SHA1 PRF-HMAC-SHA256

Dell PowerConnect W-Series ArubaOS 6.2 User Guide

Virtual Private Networks 281

Page 281
Image 281
Dell 6.2 manual PRF-HMAC-MD5 PRF-HMAC-SHA1 PRF-HMAC-SHA256

6.2 specifications

Dell 6.2 is an advanced enterprise solution that caters to the needs of businesses seeking robust performance and efficiency. As a part of Dell's commitment to innovation, the 6.2 series combines cutting-edge technologies and features that enhance productivity and deliver reliable computing experiences.

One of the standout features of the Dell 6.2 is its impressive processing power. Equipped with the latest Intel processors, it offers exceptional speed and multitasking capabilities. This allows businesses to run demanding applications effortlessly, making it ideal for data-intensive tasks such as data analysis, software development, and virtualization. The series also supports substantial RAM configurations, enabling users to manage extensive workloads without experiencing slowdowns.

In terms of storage, the Dell 6.2 line includes advanced SSD options that significantly boost data access speeds compared to traditional hard drives. This rapid access to information is vital for businesses that require quick retrieval of large datasets. Furthermore, the devices support RAID configurations, which enhances data redundancy and security, protecting critical business information from loss.

Connectivity is another critical aspect of the Dell 6.2 series. It includes multiple USB ports, HDMI outputs, and high-speed Ethernet options, ensuring that users can easily connect to various peripherals and networks. The integration of Wi-Fi 6 technology enables faster wireless connections, resulting in improved internet speeds and bandwidth efficiency, which is crucial in today’s increasingly connected workplaces.

Dell has also prioritized security in the 6.2 series. It features enhanced biometric authentication and advanced encryption methods, safeguarding sensitive data from unauthorized access. Additionally, the system's BIOS protection and automatic updates provide an added layer of security, ensuring that the device remains safe from emerging threats.

The design of the Dell 6.2 is not only sleek and modern but also built for durability. Its robust chassis is engineered to withstand the rigors of daily use, making it suitable for various business environments. This durability ensures that the investment in Dell 6.2 will last for years while maintaining performance integrity.

In summary, the Dell 6.2 series embodies a blend of speed, storage efficiency, connectivity, and security, making it a top choice for enterprises looking to enhance their computing capabilities. With its modern features and durable design, Dell 6.2 is positioned as a reliable partner in driving business success.