5–Managing Switches
Configuring the Network
59266-01 B 5-45
3. The peer configuration that was copied to the workstation clipboard is added
to the IKE Peer Database list, and is automatically renamed.
4. Click OK to save the changes and exit the IKE Configuration dialog box, or
click Cancel to exit without saving any changes.
Configuring IKE Policies
An IKE policy is an object used to describe the type (e.g., Telnet, FTP) of user
data traffic that you want to secure. Policy configurations are saved to the
database. An IKE policy defines and configures the IP security association on the
switch and the peer device by which data traffic is selected and encrypted. The
IKE database is made up of the IKE policies and peers.
Use the Create Policy dialog box (Figure 5-22) to add a new policy configuration,
remove an existing policy configuration, edit a policy configuration, copy a policy
configuration to the workstation clipboard, and paste the copied policy
configuration (automatically renamed).
Adding a Policy Configuration
To add a policy configuration:
1. On the Switch menu, click Network, and then click IPsecIKE Properties to
view the IKE Configuration dialog box (Figure 5-19).
2. On the IKE Policy Database side, click Add to view the Create Policy dialog
box (Figure 5-22).
3. Enter values in the field boxes. Refer to Table 5-10 for field definitions.
4. Click OK to close the Create Policy dialog box.
5. Click OK to save the changes and close the IKE Configuration dialog box, or
click Cancel to exit without saving any changes.