IPsec VPN Configuration
Except on the first page, right running head:  
Heading1 or Heading1NewPage text (automatic)
831
Alcatel-Lucent
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
INTERNET KEY EXCHANGE (IKE) POLICY
The purpose of IKE is to establish a secure channel. The security is based on an 
exchange, where a safe key is negotiated without being transmitted. For instance, 
the use of a preshared key to set up a secure communication channel. IKE uses 
this secure channel to negotiate the final keys. The more often the key is 
changed, the more a channel is secure.
T
O CONFIGURE AN IKE POLICY
EXAMPLE
ALU(config)# crypto ike policy P1
ALU(config-crypto-ike-policy-P1)#
Note: The “force“ keyword is used to modify or edit an IKE policy in use.
Command (in CM) Description
crypto ike policy <name> 
[force]
Use this command to configure a IKE 
policy.
The policy name can be a maximum of 
128 characters.
no crypto ike policy <name> This command deletes the IKE policy.
Note: An IKE policy cannot be 
deleted if it is used by a crypto 
map. The IKE policy has to be 
first removed from the crypto 
map and then deleted.