
VPN configuration task list
290
IPLink Software Configuration Guide
26 • VPN configuration
Mode:
Configure
mac-sha1-96 }Enables authentication and defines the authentication protocol and the hash algorithm
Use
no
in front of the above commands to delete a profile or a configuration entry.
Example: Create an IPsec transformation profile
The following example defines a profile for AES-encryption at a key length of 128.
IPLink(cfg)#profile ipsec-transform AES_128
IPLink(pf-ipstr)[AES_128]#esp-encryption aes-cbc 128
Creating an IPsec policy profile
The IPsec policy profile supplies the keys for the encryption and/or the authenticators for the authentication,
the security parameters indexes (SPIs), and IP address of the peer of the secured communication. Furthermore,
the profile defines which IPsec transformation profile to apply and whether transport or tunnel mode shall be
most effective.
The SPI identifies a secured communication channel. The IPsec component needs the SPI to select the suitable
key or authenticator. Inbound and outbound channels can have the same SPI, but the channels in the same
direction—inbound or outbound—must have unique SPIs. The SPI is not encrypted and can be monitored.
Procedure:
To create an IPsec policy profile
Step
Command
Purpose
1
node(cfg)#profile ipsec-transform
name
Creates the IPsec transformation profile
name
2
optional
node(pf-ipstr)[
name
]#esp-encryption {
aes-cbc | des-cbc | 3des-cbc } [
key-length
]
Enables encryption and defines the encryp-
tion algorithm and the key length
Supported key lengths see section
“Encryp-
tion”
on page 288
3
optional
node(pf-ipstr)[
name
]#{ ah-authentication
| esp-authentication } {hmac-md5-96 |
hmac-sha1-96 }
Enables authentication and defines the
authentication protocol and the hash algo-
rithm