Configuring an ike peer – H3C Technologies H3C SecPath F1000-E User Manual
Page 148
136
Step Command
Remarks
3.
Specify an encryption
algorithm for the IKE
proposal.
encryption-algorithm { 3des-cbc |
aes-cbc [ key-length ] | des-cbc }
Optional.
The default encryption algorithm is 56-bit
DES for the IKE proposal. In FIPS mode, the
default encryption algorithm is
AES-CBC-128.
DES-CBC and 3DES-CBC algorithms are
not available for the FIPS mode.
4.
Specify an
authentication method
for the IKE proposal.
authentication-method
{ pre-share | rsa-signature }
Optional.
By default, the IKE protocol uses a
pre-shared key for authentication.
5.
Specify an
authentication
algorithm for the IKE
proposal.
authentication-algorithm { md5 |
sha }
Optional.
The default authentication algorithm is
SHA1 for the IKE protocol.
The MD5 algorithm is not available for the
FIPS mode.
6.
Specify a DH group for
key negotiation in
phase 1.
dh { group1 | group2 | group5 |
group14 }
Optional.
The default setting is group1, which is the
768-bit DH group. In FIPS mode, the
default setting is group2.
The FIPS mode does not support group1.
7.
Set the ISAKMP SA
lifetime for the IKE
proposal.
sa duration seconds
Optional.
The default ISAKMP SA lifetime is 86400
seconds for the IKE proposal.
NOTE:
•
Before an ISAKMP SA expires, IKE negotiates a new SA to replace it. DH calculation in IKE negotiation
takes time, especially on low-end devices. To prevent SA updates from influencing normal
communication, set the lifetime greater than 10 minutes.
•
In FIPS mode, IPsec requires IKE to update the ISAKMP SA for the IPsec SA whose traffic-based lifetime
expires.
Configuring an IKE peer
For an IPsec policy that uses IKE, you must configure an IKE peer by performing the following tasks:
•
Specify the IKE negotiation mode for the local end to use in IKE negotiation phase 1. If the IP
address of the remote end is obtained dynamically, the IKE negotiation mode of the local end must
be aggressive. When acting as the IKE negotiation responder, the local end uses the IKE
negotiation mode of the remote end.
•
Specify the IKE proposals for the local end to use when acting as the IKE negotiation initiator. When
acting as the responder, the local end uses the IKE proposals configured in system view for
negotiation.
•
Configure a pre-shared key for pre-shared key authentication or a PKI domain for digital signature
authentication.
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS