Viewing the ike proposal details, Adding an ike proposal – H3C Technologies H3C Intelligent Management Center User Manual

Page 48

Advertising
background image

38

4.

Click Query.
The IKE Proposal List displays all IKE Proposals that match the query criterion. Click Reset to clear
the query criterion and display all IKE proposals.

Viewing the IKE proposal details

1.

Click the Service tab.

2.

From the navigation tree, select IPsec VPN Manager > Security Proposals > IKE proposals. The IKE
Proposal List displays all IKE proposals.

3.

Click the name of the IPsec proposal whose detailed information you want to view.
IKE proposal details contents

{

Name—IKE proposal name.

{

Authentication—Authentication method used by IKE peers for identity authentication:
Pre-Shared Key or CA Authentication.

{

Encryption Algorithm—Encryption algorithm used by IKE peers for key negotiation. This field
displays DES, 3DES, AES(128), AES(192), AES(256), or None.

{

Authentication Algorithm—Authentication algorithm used by IKE peers for key negotiation. This
field displays MD5 or SHA-1.

{

DH Group—DH group used by IKE peers for key negotiation. This field displays DH Group 1,
DH Group 2, DH Group 5, or DH Group 14.

{

ISAKMP SA Lifetime—ISAKMP SA lifetime in seconds. The value range is 60 to 604800, and
the default is 86400.

{

Comments—Description of the IKE proposal.

4.

Click Back to go back to IKE Proposal List page.

Adding an IKE proposal

1.

Click the Service tab.

2.

From the navigation tree, select IPsec VPN Manager > Security Proposals > IKE proposals.
The IKE Proposal List displays all IKE proposals.

3.

Click Add.
The Add IKE Proposal page appears.

4.

Configure the following parameters for the IKE proposal:

{

Name—Enter the name of the IKE proposal.

{

Authentication—Select the authentication method used by IKE peers for mutual authentication,
Pre-Shared Key or CA Authentication.

{

Encryption Algorithm—Select the encryption algorithm used by IKE peers to for key negotiation.
Options are DES, 3DES, AES(128), AES(192), and AES(256).

{

Authentication Algorithm—Select the authentication algorithm used by IKE peers to for key
negotiation. Options are MD5 and SHA-1.

{

DH Group—Select the DH group used by IKE peers for key negotiation. Options are DH Group
1, DH Group 2, DH Group 5, and DH Group 14.

Advertising