Parameter Description
IPSec Associations Table
Web: IP Security
Associations Table
EMS: IPSec SA Table
[IPSecSATable]
This table parameter defines the IPSec SA table. This table allows you
to configure the Internet Key Exchange (IKE) and IP Security (IPSec)
protocols. You can define up to 20 IPSec peers.
The format of this parameter is as follows:
[ IPsecSATable ]
FORMAT IPsecSATable_Index =
IPsecSATable_RemoteEndpointAddressOrName,
IPsecSATable_AuthenticationMethod, IPsecSATable_SharedKey,
IPsecSATable_SourcePort, IPsecSATable_DestPort,
IPsecSATable_Protocol, IPsecSATable_Phase1SaLifetimeInSec,
IPsecSATable_Phase2SaLifetimeInSec,
IPsecSATable_Phase2SaLifetimeInKB, IPsecSATable_DPDmode,
IPsecSATable_IPsecMode, IPsecSATable_RemoteTunnelAddress,
IPsecSATable_RemoteSubnetIPAddress,
IPsecSATable_RemoteSubnetPrefixLength,
IPsecSATable_InterfaceName;
[ \IPsecSATable ]
For example:
IPsecSATable 1 = 0, 10.3.2.73, 0, 123456789, 0, 0, 0, 0, 28800, 3600, ;
In the above example, a single IPSec/IKE peer (10.3.2.73) is
configured. Pre-shared key authentication is selected, with the pre-
shared key set to 123456789. In addition, a lifetime of 28800 seconds
is selected for IKE and a lifetime of 3600 seconds is selected for IPSec.
Note: For a detailed description of this table, see 'Configuring IP
Security Associations Table' on page 139.
IPSec Proposal Table
Web: IP Security Proposal
Table
EMS: IPSec Proposal Table
[IPSecProposalTable]
This table parameter defines up to four IKE proposal settings, where
each proposal defines an encryption algorithm, an authentication
algorithm, and a Diffie-Hellman group identifier.
[ IPsecProposalTable ]
FORMAT IPsecProposalTable_Index =
IPsecProposalTable_EncryptionAlgorithm,
IPsecProposalTable_AuthenticationAlgorithm,
IPsecProposalTable_DHGroup;
[ \IPsecProposalTable ]
For example:
IPsecProposalTable 0 = 3, 2, 1;
IPsecProposalTable 1 = 2, 2, 1;
In the example above, two proposals are defined:
ï‚§ Proposal 0: AES, SHA1, DH group 2
ï‚§ Proposal 1: 3DES, SHA1, DH group 2
Note: For a detailed description of this table, see 'Configuring IP
Security Proposal Table' on page 136.