beautypg.com

Using an algorithm proposal list – Amer Networks E5Web GUI User Manual

Page 592

background image

CAST128, MD5, SHA1.

Example 9.1. Using an Algorithm Proposal List

This example shows how to create and use an IPsec Algorithm Proposal List for use in the VPN
tunnel. It will propose 3DES and DES as encryption algorithms. The hash function SHA1 and MD5
will both be used in order to check if the data packet is altered while being transmitted. Note
that this example does not illustrate how to add the specific IPsec tunnel object. It will also be
used in a later example.

Command-Line Interface
First create a list of IPsec Algorithms:

Device:/> add IPsecAlgorithms esp-l2tptunnel

DESEnabled=Yes
DES3Enabled=Yes
SHA1Enabled=Yes
MD5Enabled=Yes

Then, apply the algorithm proposal list to the IPsec tunnel:

Device:/> set Interface IPsecTunnel MyIPsecTunnel

IPsecAlgorithms=esp-l2tptunnel

InControl

Follow the same steps used for the Web Interface below.

Web Interface

First create a list of IPsec Algorithms:

1.

Go to: Objects > VPN Objects > IPsec Algorithms > Add > IPsec Algorithms

2.

Enter a name for the list, for example esp-l2tptunnel

3.

Now check the following:

DES

3DES

SHA1

MD5

4.

Click OK

Then, apply the algorithm proposal list to the IPsec tunnel:

1.

Go to: Network > Interfaces and VPN > IPsec

2.

Select the target IPsec tunnel

3.

Select the recently created esp-l2tptunnel in the IPsec Algorithms control

4.

Click OK

Chapter 9: VPN

592

This manual is related to the following products: