Chapter 5
Setup and Configuration
Click Commit to save the changes or click Revert All to abort. A confirmation dialog box appears. Click OK
4.
to proceed.
5.
Click Exit Transaction or continue making changes.
Section 5.28.7
Managing the Internet Key Exchange (IKE) Protocol
The Internet Key Exchange (IKE) protocol negotiates connection parameters, including keys, for the
Encapsulated Security Payload (ESP) protocol employed by IPsec. IKE is based on the Diffie-Hellman key
exchange protocol, which allows two parties without any initially shared secret to create one in a manner immune
to eavesdropping.
The following sections describe how to configure and manage the Internet Key Exchange (IKE) protocol:
•
Section 5.28.7.1, "Viewing a List of IKE Algorithms"
•
Section 5.28.7.2, "Adding an IKE Algorithm"
•
Section 5.28.7.3, "Deleting an IKE Algorithm"
Section 5.28.7.1
Viewing a List of IKE Algorithms
To view a list of algorithms for the Internet Key Exchange (IKE) protocol, navigate to tunnel » ipsec »
connection » {connection} » ike » algorithm, where {connection} is the name of the connection. If algorithms
have been configured, the Algorithm table appears.
Figure 730: Algorithm Table
If no algorithms have been configured, add algorithms as needed. For more information, refer to
"Adding an IKE
Algorithm".
Section 5.28.7.2
Adding an IKE Algorithm
To add a new algorithm for the Internet Key Exchange (IKE) protocol, do the following:
1.
Change the mode to Edit Private or Edit Exclusive.
2.
Navigate to tunnel » ipsec » connection » {connection} » ike, where {connection} is the name of the
connection.
3.
Click <Add agorithm>. The Key Settings form appears.
626
Managing the Internet Key Exchange (IKE) Protocol
RUGGEDCOM ROX II
User Guide
Section 5.28.7.2,