Internet key exchange (ike) settings – Netopia 6.3 User Manual

Page 144

Advertising
background image

144

Appendix A

CONFIG Commands

See

page 73

for details about SafeHarbour IPsec tunnel capability.

See

page 73

for details about SafeHarbour IPsec tunnel capability.

See

page 73

for details about SafeHarbour IPsec tunnel capability.

See

page 73

for details about SafeHarbour IPsec tunnel capability.

Internet Key Exchange (IKE) Settings

The following four IPsec parameters configure the rekeying event.

The soft parameters designate when the system negotiates a new key. For
example, after 82800 seconds (23 hours) or 1 Gbyte has been transferred
(whichever comes first) the key will be renegotiated.

The hard parameters indicate that the renegotiation must be complete or the
tunnel will be disabled. For example, 86400 seconds (24 hours) means that
the renegotiation must be complete within one day.

Both ends of the tunnel set parameters, and typically they will be the same. If they
are not the same, the rekey event will happen when the longest time period
expires or when the largest amount of data has been sent.

BOTH

set security ipsec tunnels name "123" IKE-mode
DH-group (1) { 1 | 2 | 5}

BOTH

set security ipsec tunnels name "123" IKE_mode
isakmp-SA-encrypt (DES) {DES | 3DES | Blowfish | CAST}

BOTH

set security ipsec tunnels name "123" isakmp-SA-hash
(MD5) {MD5 | SHA1}

BOTH

set security ipsec tunnels name "123"PFS-DH-group
(off) {off | 1 | 2 | 5 }

BOTH

set security ipsec tunnels name "123" IKE-mode
ipsec-soft-mbytes (1000) {1-1000000}

BOTH

set security ipsec tunnels name "123" IKE-mode
ipsec-soft-seconds (82800) {60-1000000}

BOTH

set security ipsec tunnels name "123" IKE-mode
ipsec-hard-mbytes (1200) {1-1000000}

BOTH

set security ipsec tunnels name "123" IKE-mode
ipsec-hard-seconds (86400) {60-1000000}

Advertising