Compatible Systems INTRAPORT 2+ User Manual

Page 45

Advertising
background image

Chapter 6 - Basic Configuration Guide

39

will only initiate tunnel establishment attempts and will not
respond to them.

If Respond is selected, this Tunnel Partner will use IKE, but
will only respond to tunnel establishment attempts and will not
initiate them.

B. Enter the Shared Key. This is a shared alphanumeric secret

that is used to generate session keys.

C. Select the authentication and encryption algorithms to be used

for tunnel sessions using the IKE Configuration Transform list
box.

Click on the Add... button in the Transform section to access
the IKE Configuration Transform List dialog box.

IKE Configuration Transform List

The default settings of MD5 for Authentication and DES for
Encryption are adequate for most setups. Click OK.

D. In the IKE Key Management dialog box, you may click on the

PFS checkbox to add additional security parameters during
tunnel sessions. (This is optional.)

v Note: For more information regarding encryption, authentication,
and Perfect Forward Secrecy, refer to the
CompatiView Management
Software Reference Guide
.

E.

Click OK.

Advertising