Avaya Configuring IPsec Services Bedienungsanleitung Seite 55

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 122
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 54
Starting IPsec
308630-14.00 Rev 00
3-9
Creating an Outbound Protect Policy With Automated SAs (IKE)
To use IKE to create automated SAs, complete the following tasks:
Site Manager Procedure
You do this System responds
1. In the IPsec Configuration for Interface
window, click on
Outbound Policies
.
The IPsec Outbound Policies window
appears.
2. Click on Add Policy. The Create Outbound Policy window
appears.
3. Type a name for the policy, choose a
template containing a Protect action, and
click OK.
If the policy includes a protect action, the
Choose SA Type dialog box opens.
4. Click on
Automated SA
. The Add Proposal to Policy window
opens.
Note: If a node protection key has not yet been set, the Node Protection Key dialog box
opens before the Add Proposal to Policy window. Enter an NPK and click on OK. See
“Creating and Using Node Protection Keys (NPKs)” on page 2-5
for more information.
5. Choose Enabled or Disabled from the PFS
pull-down menu to set perfect forward
secrecy settings.
6. Choose a Disabled or a packet size from
the Anti-Replay Window Size pull-down
menu.
7. Click on Add to specify the SA Destination
address and pre-shared key for IKE SAs.
Click on
Help
or see the parameter
descriptions beginning on page A-4
for
more information.
The Add IKE SA Destination window
appears. Enter the IP address and
pre-shared key, and click on Done to
return to the Add Proposal to Policy
window.
8. Click on New Proposal to create an
encryption type proposal that IKE will use
when negotiating SA keys with the SA
destination node.
The Edit IPsec Proposal window appears.
9. Type a proposal name, choose one or
more encryption methods for the proposal,
choose an Expiry type, change the Expiry
value if desired, and click on
Done
.
You return to the Edit IPsec Proposal
window. Repeat steps 6 and 7 to create
additional proposals if needed.
(continued)
Seitenansicht 54
1 2 ... 50 51 52 53 54 55 56 57 58 59 60 ... 121 122

Kommentare zu diesen Handbüchern

Keine Kommentare