6 - 66 WiNG 4.4 Switch System Reference Guide
9. If the properties of an existing peer IP address and key are no longer relevant and cannot be edited, click the
Add
button
to create a new pre-shared key
a. Select the
Peer IP Address checkbox
to associate an IP address with the specific tunnel used by a group of
peers or, select the
Distinguished Name
checkbox to configure the switch to restrict access to those peers with
the same distinguished name, or select the
Hostname
checkbox to allow shared-key messages between
corresponding hostnames.
b. Define the
Key
(string ID) a remote peer uses to look up the pre-shared to interact securely with peers within the
tunnel.
c. Refer to the
Status
field for the current state of requests made from applet. This field displays error messages if
something is wrong in the transaction between the applet and the switch.
d. Click
OK
to use the changes to the running configuration and close the dialog.
e. Click
Cancel
to close the dialog without committing updates to the running configuration.
6.6.2 Setting IKE Policies
Each IKE negotiation is divided into two phases. Phase 1 creates the first tunnel (protecting later IKE negotiation
messages) and phase 2 creates the tunnel protecting the data. To define the terms of the IKE negotiation, create one or
more IKE policies. Include the following:
• An authentication scheme to ensure the credentials of the peers
• An encryption scheme to protect the data
• A HMAC method to ensure the identity of the sender, and validate a message has not been altered
• A Diffie-Hellman group establishing the strength of the of the encryption-key algorithm.
• A time limit for how long the encryption key is used before it is replaced.
If IKE policies are not defined, the switch uses the default policy (with a default priority of 10001) and contains the default
values. When IKE negotiations begin, the peer initiating the negotiation sends its policies to the remote peer. The remote
peer searches for a match with its own policies using the defined priority scheme.
A IKE policy matches when they have the same encryption, hash, authentication and Diffie-Hellman settings. The SA
lifetime must also be less than or equal to the lifetime in the policy sent. If the lifetimes do not match, the shorter lifetime
applies. If no match exists, IKE refuses negotiation.
To view the current set of IKE policies:
1. Select
Security
>
IKE Settings
from the main menu tree.
2. Click the
IKE Policies
tab.
Содержание WiNG 4.4
Страница 1: ...Motorola Solutions WiNG 4 4 SYSTEM REFERENCE GUIDE ...
Страница 2: ......
Страница 3: ...MOTOROLA SOLUTIONS WING 4 4 SYSTEM REFERENCE GUIDE 72E 157062 01 Revision A January 2012 ...
Страница 6: ...iv WiNG 4 4 Switch System Reference Guide ...
Страница 14: ...xii WiNG 4 4 Switch System Reference Guide ...
Страница 48: ...1 32 WiNG 4 4 Switch System Reference Guide ...
Страница 58: ...2 10 WiNG 4 4 Switch System Reference Guide ...
Страница 117: ...Network Setup 4 13 7 Click Cancel to close the dialog without committing updates to the running configuration ...
Страница 280: ...4 176 WiNG 4 4 Switch System Reference Guide ...
Страница 352: ...5 72 WiNG 4 4 Switch System Reference Guide ...
Страница 476: ...6 124 WiNG 4 4 Switch System Reference Guide ...
Страница 506: ...7 30 WiNG 4 4 Switch System Reference Guide ...
Страница 532: ...8 26 WiNG 4 4 Switch System Reference Guide ...
Страница 536: ...A 4 WiNG 4 4 Switch System Reference Guide ...
Страница 544: ...B 12 WiNG 4 4 Switch System Reference Guide ...
Страница 558: ...B 26 WiNG 4 4 Switch System Reference Guide ...
Страница 574: ...C 16 WiNG 4 4 Switch System Reference Guide ...
Страница 596: ...E 4 WiNG 4 4 Switch System Reference Guide ...
Страница 597: ......