![Extreme Networks Altitude 4700 Series Product Reference Manual Download Page 235](http://html1.mh-extra.com/html/extreme-networks/altitude-4700-series/altitude-4700-series_product-reference-manual_2454778235.webp)
Altitude 4700 Series Access Point Product Reference Guide
235
4
Click
Ok
to return to the VPN screen. Click Apply to retain the settings made on the
Auto Key
Settings
screen.
5
Click
Cancel
to return to the VPN screen without retaining the changes made to this screen.
Configuring IKE Key Settings
The
Internet Key Exchange (IKE)
is an IPsec standard protocol used to ensure security for VPN
negotiation and remote host or network access. IKE provides an automatic means of negotiation and
authentication for communication between two or more parties. In essence, IKE manages IPSec keys
automatically for the parties.
To configure IKE key settings for the access point:
1
Select
Network Configuration
>
WAN
>
VPN
from the access point menu tree.
2
Refer to the
VPN Tunnel Config
field, select the
Auto (IKE) Key Exchange
radio button and click the
IKE Settings
button.
ESP Encryption
Algorithm
Use this menu to select the encryption and authentication
algorithms for this VPN tunnel.
•
DES
—Selects the DES algorithm.No keys are required
to be manually provided.
•
3DES
—Selects the 3DES algorithm. No keys are
required to be manually provided.
•
AES 128-bit—
Selects the Advanced Encryption
Standard algorithm with 128-bit. No keys are required
to be manually provided.
•
AES 192-bit—
Selects the Advanced Encryption
Standard algorithm with 192-bit. No keys are required
to be manually provided.
•
AES 256-bit
—Selects the Advanced Encryption
Standard algorithm with 256-bit. No keys are required
to be manually provided.
ESP Authentication
Algorithm
Use this menu to select the authentication algorithm to be
used with ESP. This menu is only active when ESP with
Authentication was selected for the ESP type.
•
MD5
—Enables the Message Digest 5 algorithm
requiring 128-bit. No keys are required to be manually
provided.
•
SHA1
—Enables Secure Hash Algorithm. No keys are
required to be manually provided.
Summary of Contents for Altitude 4700 Series
Page 14: ...Altitude 4700 Series Access Point Product Reference Guide 14...
Page 62: ...Hardware Installation Altitude 4700 Series Access Point Product Reference Guide 62...
Page 76: ...Getting Started Altitude 4700 Series Access Point Product Reference Guide 76...
Page 122: ...System Configuration Altitude 4700 Series Access Point Product Reference Guide 122...
Page 604: ...Configuring Mesh Networking Altitude 4700 Series Access Point Product Reference Guide 604...
Page 624: ...Adaptive AP Altitude 4700 Series Access Point Product Reference Guide 624...
Page 630: ...Altitude 4700 Series Access Point Product Reference Guide 630...
Page 646: ...Altitude 4700 Series Access Point Product Reference Guide 646...
Page 648: ...Altitude 4700 Series Access Point Product Reference Guide 648...