EasyManuals Logo

AudioCodes Mediant 3000 User Manual

AudioCodes Mediant 3000
1070 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #188 background imageLoading...
Page #188 background image
User's Manual 188 Document #: LTRT-89730
Mediant 3000
2. Click Add; the following dialog box appears:
Figure 14-11: IP Security Proposals Table - Add Row Dialog Box
3. Configure the parameters, as required. For a description of the parameters, see the
table below.
4. Click Add.
5. To save the changes to flash memory, see ''Saving Configuration'' on page 672.
Table 14-8: IP Security Proposals Table Parameters
Parameter Name Description
Encryption Algorithm
[IPsecProposalTable_Enc
ryptionAlgorithm]
Defines the encryption (privacy) algorithm.
ï‚§ [0] NONE
ï‚§ [1] DES CBC
ï‚§ [2] 3DES CBC
ï‚§ [3] AES (default)
Authentication Algorithm
[IPsecProposalTable_Aut
henticationAlgorithm]
Defines the message authentication (integrity) algorithm.
ï‚§ [0] NONE
ï‚§ [2] HMAC SHA1 96
ï‚§ [4] HMAC MD5 96 (default)
Diffie Hellman Group
[IPsecProposalTable_DH
Group]
Defines the length of the key created by the DH protocol for up to four
proposals. For the ini file parameter, X denotes the proposal number (0
to 3).
ï‚§ [0] Group 1 (768 Bits) = DH-786-Bit
ï‚§ [1] Group 2 (1024 Bits) (default) = DH-1024-Bit
14.4.3 Configuring IP Security Associations Table
The IP Security Associations table allows you to configure up to 20 peers (hosts or
networks) for IP security (IPSec)/IKE. Each of the entries in this table controls both Main
and Quick mode configuration for a single peer. Each row in the table refers to a different
IP destination. IPSec can be applied to all traffic to and from a specific IP address.
Alternatively, IPSec can be applied to a specific flow, specified by port (source or
destination) and protocol type.
The destination IP address (and optionally, destination port, source port and protocol type)
of each outgoing packet is compared to each entry in the table. If a match is found, the
device checks if an SA already exists for this entry. If no SA exists, the IKE protocol is
invoked and an IPSec SA is established and the packet is encrypted and transmitted. If a
match is not found, the packet is transmitted without encryption.

Table of Contents

Other manuals for AudioCodes Mediant 3000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the AudioCodes Mediant 3000 and is the answer not in the manual?

AudioCodes Mediant 3000 Specifications

General IconGeneral
BrandAudioCodes
ModelMediant 3000
CategoryGateway
LanguageEnglish

Related product manuals