beautypg.com

Motorola Series Switch WS5100 User Manual

Page 264

background image

6-40 WS5100 Series Switch System Reference Guide

3. Refer to the values displayed within the IKE Policies tab to determine if an existing policy requires

revision, removal or a new policy requires creation.

4. Highlight an existing policy and click the

Edit

button to revise the policy’s existing priority, encryption

scheme, hash value, authentication scheme, SA lifetime and DH group.

5. Select an existing policy and click the

Delete

button to remove it from the table.

Priority

Displays the priority for the IKE policy. The available range is from 1 to 65,543, with 1 being
the highest priority value.

Encryption

Displays the encryption method protecting data transmitted between peers. Options include:

• DES. 56-bit DES-CBC is less secure but faster than the alternatives. The default value.

• 3DES - 168-bit Triple DES.

• AES - 128-bit AES.

• AES 192 - 192-bit AES.

• AES 256 - 256-bit AES.

Hash Value

Displays the hash algorithm used to ensure data integrity. The hash value validates a packet
comes from its intended destination, and has not been modified in transit. Options include:

• SHA - The default value.

• MD5 - MD5 has a smaller digest and is somewhat faster than SHA-1.

Authentication Type

Displays the authentication scheme used to validate the identity of each peer. Pre-shared
keys do not scale accurately with a growing network but are easier to maintain in a small
network. Options include:

• Pre-shared Key - Uses pre-shared keys.

• RSA Signature- Uses a digital certificate with keys generated by the RSA signatures

algorithm.

SA Lifetime

Displays an integer for the SA lifetime. The default is 60 seconds. With longer lifetimes,
security defines future IPSec security associations quickly. Encryption strength is great
enough to ensure security without using fast rekey times. Motorola recommends using the
default value.

DH Group

Displays the Diffie-Hellman (DH) group identifier. IPSec peers use the defined value to derive
a shared secret without transmitting it to one another.