Summit WM3000 Series Controller System Reference Guide
369
9
If the properties of an existing peer IP address, key and aggressive mode designation are no longer
relevant and cannot be edited, click the
Add
button to create a new pre-shared key
a
Select the
Peer IP Address checkbox
to associate an IP address with the specific tunnel used by a
group of peers or, select the
Distinguished Name
checkbox to configure the controller to restrict
access to those peers with the same distinguished name, or select the
Hostname
checkbox to allow
shared-key messages between corresponding hostnames.
b
Define the
Key
(string ID) a remote peer uses to look up the pre-shared to interact securely with
peers within the tunnel.
c
Select the
Aggressive Mode
checkbox (if required). Aggressive mode enables you to configure IKE
pre-shared keys as Radius tunnel attributes for IP Security (IPSec) peers.
d
Refer to the
Status
field for the current state of requests made from applet. This field displays
error messages if something is wrong in the transaction between the applet and the controller.
e
Click
OK
to use the changes to the running configuration and close the dialog.
f
Click
Cancel
to close the dialog without committing updates to the running configuration.
Setting IKE Policies
Each IKE negotiation is divided into two phases. Phase 1 creates the first tunnel (protecting later IKE
negotiation messages) and phase 2 creates the tunnel protecting the data. To define the terms of the IKE
negotiation, create one or more IKE policies. Include the following:
●
An authentication scheme to ensure the credentials of the peers
●
An encryption scheme to protect the data
●
A HMAC method to ensure the identity of the sender, and validate a message has not been altered
●
A Diffie-Hellman group establishing the strength of the of the encryption-key algorithm.
●
A time limit for how long the encryption key is used before it is replaced.
If IKE policies are not defined, the controller uses the default policy (with a default priority of 10001)
and contains the default values. When IKE negotiations begin, the peer initiating the negotiation sends
Summary of Contents for Summit WM3000 Series
Page 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Page 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Page 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Page 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Page 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Page 513: ......