Internet Key Exchange (IKE) IPsec Key Management for VPNs 5-7
the Phase 1 SAs under which they were created. Phase 2 SAs “dangle” when the Phase 1 SA under which
they were created expires before they do. There is no requirement that the Phase 1 SA exist for the
duration of the Phase 2 SA’s lifetime, but it is convenient because a Delete message may be sent.
■
The two SA Lifetime items specify the lifetime associated with each Phase 1 SA and control when the SA
will expire and become invalid.
■
Phase 1 SA Lifetime (seconds)
specifies the duration in seconds for which the SA will remain valid.
The range of permissible values is the set of non-negative integer values between 0 and 2^32-1. The
default value is 28,800 seconds. The value zero specifies the default.
■
Phase 1 SA Lifetime (Kbytes)
specifies the maximum number of kilobytes of data that may be
secured (encr ypted/decr ypted or authenticated) using the SA before it expires and becomes invalid.
The range of permissible values is the set of non-negative integer values between 0 and 2^32-1. The
default value is 0 Kilobytes. The value zero specifies the absence of a secured data lifetime.
Note:
It is invalid to set both lifetime values to zero. This condition is not enforced by the console (in order to
avoid order dependencies when configuring the items), but will set defaults at runtime.
■
Send Initial Contact Message
toggles whether or not the IKE negotiation process begins by sending an
initial contact message. The default is
Yes
.
■
Include Vendor-ID Payload
toggles whether or not the router includes the vendor-ID payload in its IKE
Phase 1 messages.
■
Independent Phase 2 Re-keys
toggles whether or not a Phase 2 re-keys requires a Phase 1 re-key. If this
item is set to Yes (the default), Phase 2 re-keys will be per formed independently when necessar y without
requiring a Phase 1 re-key. If this item is set to No, each Phase 2 re-key will be preceded by a Phase 1
re-key. This item should normally be set to Yes unless the device is communicating with a non-compliant
remote IPsec peer that requires that a Phase 1 re-key precede each Phase 2 re-key.
■
Strict Port Policy
toggles whether or not IKE requires packets to originate from the IANA IKE por t (500).
Set to
Yes
, the router will listen only to por t 500 and source its packets from por t 500. Set to
No
, the
router will return traffic to whatever por t originated it.
Содержание 4000 Series
Страница 10: ...x Firmware User Guide Packet header types B 14 Appendix C Binary Conversion Table C 1 Index ...
Страница 18: ...1 8 Firmware User Guide ...
Страница 66: ...2 48 Firmware User Guide ...
Страница 102: ...3 36 Firmware User Guide ...
Страница 130: ...4 28 Firmware User Guide ...
Страница 206: ...7 18 Firmware User Guide ...
Страница 224: ...9 14 Firmware User Guide ...
Страница 274: ...10 50 Firmware User Guide ...
Страница 314: ...Index 6 ...