V6100 and V7122 User Guide
329
Parameter Name
Description
Authentication Method
[IkePolicyAuthenticationMeth
od]
Determines the valid authentication method (V6100 only).
0 = Pre-shared key based authentication (default).
1 = X.509 Certificate based authentication.
To configure the server / client certificates, see
Server Certificate
Replacement
and
Client Certificates
.
When X.509 authentication is configured, the
IKEPolicySharedKey parameters aren’t required.
IKE SA LifeTime (sec)
[IKEPolicyLifeInSec]
Determines the time (in seconds) the SA negotiated in the first IKE session
(main mode) is valid. After the time expires, the SA is re-negotiated.
The default value is 28800 (8 hours).
IKE SA LifeTime (KB)
[IKEPolicyLifeInKB]
Determines the lifetime (in kilobytes) the SA negotiated in the first IKE
session (main mode) is valid. After this size is reached, the SA is re-
negotiated.
The default value is 0 (this parameter is ignored).
The lifetime parameters (IKEPolicyLifeInSec and IKEPolicyLifeInKB) determine the duration the SA created
in the main mode phase is valid. When the lifetime of the SA expires, it is automatically renewed by
performing the IKE first phase negotiations. To refrain from a situation where the SA expires, a new SA is
being negotiated while the old one is still valid. As soon as the new SA is created, it replaces the old one.
This procedure occurs whenever an SA is about to expire.
If no IKE methods are defined (Encryption / Authentication / DH Group), the default settings
(shown in
Table 75
) are applied.
Table 75
Default IKE First Phase Proposals
Encryption
Authentication
DH
Group
Proposal 0
3DES
SHA1
1024
Proposal 1
3DES
MD5
1024
Proposal 2
3DES
SHA1
786
Proposal 3
3DES
MD5
786
To configure the IKE table using the
ini
file:
The IKE parameters are configured using
ini
file tables (described in
Using Parameter
Tables
). Each line in the table refers to a different IKE peer.
The Format line (IKE_DB_INDEX in the example below) specifies the order in which the
actual data lines are written. The order of the parameters is irrelevant. Parameters are not
mandatory unless stated otherwise. To support more than one Encryption / Authentication /
DH Group proposals, for
each
proposal specify the relevant parameters in the Format line.
Note that the proposal list must be contiguous.
Summary of Contents for TP-1610
Page 28: ...28 V6100 and V7122 User Guide Reader s Notes ...
Page 48: ...48 V6100 and V7122 User Guide Reader s Notes ...
Page 72: ...72 V6100 and V7122 User Guide Reader s Notes ...
Page 80: ...80 V6100 and V7122 User Guide Reader s Notes ...
Page 152: ...152 V6100 and V7122 User Guide Reader s Notes ...
Page 262: ...262 V6100 and V7122 User Guide Reader s Notes ...
Page 284: ...284 V6100 and V7122 User Guide Reader s Notes ...
Page 291: ...V6100 and V7122 User Guide 291 Figure 95 V7122 Startup Process ...
Page 324: ...324 V6100 and V7122 User Guide Reader s Notes ...
Page 354: ...354 V6100 and V7122 User Guide Reader s Notes ...
Page 374: ...374 V6100 and V7122 User Guide Reader s Notes ...
Page 382: ...382 V6100 and V7122 User Guide Figure 130 Example of a User Information File Reader s Notes ...
Page 392: ...392 V6100 and V7122 User Guide Reader s Notes ...
Page 409: ...V6100 and V7122 User Guide 409 Reader s Notes ...
Page 413: ...V6100 and V7122 User Guide 413 Reader s Notes ...
Page 425: ...V6100 and V7122 User Guide 425 Figure 145 UDP2File Utility Reader s Notes ...
Page 431: ...V6100 and V7122 User Guide 431 Reader s Notes ...
Page 447: ...V6100 and V7122 User Guide 447 Reader s Notes ...
Page 483: ...V6100 and V7122 User Guide 483 Reader s Notes ...