Netopia 6.3 manual Internet Key Exchange IKE Settings

Models: 6.3

1 161
Download 161 pages 41.36 Kb
Page 144
Image 144

Appendix A

CONFIG Commands

BOTH

set security ipsec tunnels name "123" IKE-mode DH-group (1) { 1 2 5}

See page 73 for details about SafeHarbour IPsec tunnel capability.

BOTH

set security ipsec tunnels name "123" IKE_mode isakmp-SA-encrypt (DES) {DES 3DES Blowfish CAST}

See page 73 for details about SafeHarbour IPsec tunnel capability.

BOTH

set security ipsec tunnels name "123" isakmp-SA-hash (MD5) {MD5 SHA1}

See page 73 for details about SafeHarbour IPsec tunnel capability.

BOTH

set security ipsec tunnels name "123"PFS-DH-group (off) {off 1 2 5 }

See page 73 for details about SafeHarbour IPsec tunnel capability.

Internet Key Exchange (IKE) Settings

The following four IPsec parameters configure the rekeying event.

BOTH set security ipsec tunnels name "123" IKE-mode ipsec-soft-mbytes (1000) {1-1000000}

BOTH set security ipsec tunnels name "123" IKE-mode ipsec-soft-seconds (82800) {60-1000000}

BOTH set security ipsec tunnels name "123" IKE-mode ipsec-hard-mbytes (1200) {1-1000000}

BOTH set security ipsec tunnels name "123" IKE-mode ipsec-hard-seconds (86400) {60-1000000}

The soft parameters designate when the system negotiates a new key. For example, after 82800 seconds (23 hours) or 1 Gbyte has been transferred (whichever comes first) the key will be renegotiated.

The hard parameters indicate that the renegotiation must be complete or the tunnel will be disabled. For example, 86400 seconds (24 hours) means that the renegotiation must be complete within one day.

Both ends of the tunnel set parameters, and typically they will be the same. If they are not the same, the rekey event will happen when the longest time period expires or when the largest amount of data has been sent.

144

Page 144
Image 144
Netopia 6.3 manual Internet Key Exchange IKE Settings