ACCESS GATEWAY
84 System Administration
Note that the files must exist on flash first.
4. In the IKE Channel Security Parameters section, select the following settings:
Acceptable Encryption Algorithms – Check the DES and/or 3DES checkboxes (you
must check at least one option).
Acceptable Hash Algorithm – Check the MD5 and/or SHA checkboxes (you must
check at least one option).
Key Strength (a.k.a. Diffie-Hellman) – Select either 768-bit (Group 1) or 1024-bit
(Group 2).
Lifetime – Enter the value (in seconds) in the Lifetime field. Data life size is NOT
supported.
5. Click Add to add the IPSec tunnel peer to the IPSec Tunnel Peers table on the IPSec
Tunnel Settings screen.
6. Click the Back to Main IPSec Tunneling Settings page link to return to the IPSec Tunnel
Settings screen.
Modifying an Existing IPSec Tunnel Peer
1. Click on the IPSec tunnel peer link that you wish to modify in the IPSec Tunnel Peers
table. The IPSec Tunnel Peer Settings screen opens.
2. Modify the settings as desired.
3. Click:
Modify to save the changes to the peer.
Remove to remove the peer from the IPSec Tunnel Peers table.
Reset to undo any changes you made to the peer settings and return the peer to its
original settings.
4. Click the Back to Main IPSec Tunneling Settings page link to return to the IPSec Tunnel
Settings screen.
Managing IPSec Security Policies
You can add a new IPSec security policy or modify the settings of an existing IPSec security
policy from the IPSec Tunnel Settings screen.