Using an algorithm proposal list – Amer Networks E5Web GUI User Manual
Page 592

CAST128, MD5, SHA1.
Example 9.1. Using an Algorithm Proposal List
This example shows how to create and use an IPsec Algorithm Proposal List for use in the VPN
tunnel. It will propose 3DES and DES as encryption algorithms. The hash function SHA1 and MD5
will both be used in order to check if the data packet is altered while being transmitted. Note
that this example does not illustrate how to add the specific IPsec tunnel object. It will also be
used in a later example.
Command-Line Interface
First create a list of IPsec Algorithms:
Device:/> add IPsecAlgorithms esp-l2tptunnel
DESEnabled=Yes
DES3Enabled=Yes
SHA1Enabled=Yes
MD5Enabled=Yes
Then, apply the algorithm proposal list to the IPsec tunnel:
Device:/> set Interface IPsecTunnel MyIPsecTunnel
IPsecAlgorithms=esp-l2tptunnel
InControl
Follow the same steps used for the Web Interface below.
Web Interface
First create a list of IPsec Algorithms:
1.
Go to: Objects > VPN Objects > IPsec Algorithms > Add > IPsec Algorithms
2.
Enter a name for the list, for example esp-l2tptunnel
3.
Now check the following:
•
DES
•
3DES
•
SHA1
•
MD5
4.
Click OK
Then, apply the algorithm proposal list to the IPsec tunnel:
1.
Go to: Network > Interfaces and VPN > IPsec
2.
Select the target IPsec tunnel
3.
Select the recently created esp-l2tptunnel in the IPsec Algorithms control
4.
Click OK
Chapter 9: VPN
592