Switch Security
•A priority value (1 through 65,543, with 1 as highest priority permitted)
•An authentication scheme ensure the credentials of the peers
•An encryption scheme protecting the data
•A HMAC method ensuring the identity of the sender, and validating that the message has not been altered
•A
•A time limit for how long the encryption key is used before it is replaced.
If IKE policies are not defined, the switch uses the default policy (always set to the lowest priority) and contains the default values. When IKE negotiations start, the peer initiating the negotiation sends its policies to the remote peer. The remote peer searches for a match with its own policies using the defined priority scheme.
A IKE policies match when they have the same encryption, hash, authentication and
To view the current set of IKE policies:
1.Select Security > IKE Settings from the main menu tree.
2.Click the IKE Policies tab.