
Configuring IPsec Services
3-10
308630-14.00 Rev 00
About Manual SA Creation
To protect (encrypt or authenticate) data packets leaving the local IPsec interface,
create a Protect SA and link it to a Protect outbound policy. To decrypt or
authenticate incoming packets at the local IPsec interface, create an Unprotect SA.
(The Unprotect SA does not need to be linked to a policy.) Then, do the same for
the IPsec interface on the remote router.
The cipher and integrity algorithms and keys that you specify in SAs must be
identical on both ends of a connection. You must select either the cipher or the
integrity service or both within the Protect and Unprotect SA parameters. For
example, the cipher key in a Protect SA on the local IP interface must match the
cipher key in the Unprotect SA on the remote router IP interface.
10. In the Edit IPsec Proposal window, choose
the SA destination you created from the
pull-down menu, choose one to four
proposals (in order of priority) from the
Proposals pull-down menus, and click on
OK
.
You return to the IPsec Outbound Policies
window.
11. Click on
Done
. You return to the IPsec Configuration for
Interface window.
Note:
Manual SAs must be configured to encrypt, authenticate, or both. Site
Manager does not allow you to create an SA if both the Cipher Algorithm and
the Integrity Algorithm parameters are set to None.
Site Manager Procedure
(continued)
You do this System responds
Kommentare zu diesen Handbüchern