• You must also specify the PSK character string when you select [psk].
• Note that if you select "Certificate", the certificate for IPsec must be installed and specified
before it can be used. To install and specify the certificate use Web Image Monitor.
PSK character string setting
msh> ipsec ike {1|2|3|4|default} psk "PSK character string"
• If you select PSK as the authentication method, enter the separate setting number [1-4] or
[default] and specify the PSK character string.
• Specify the character string in ASCII characters. There can be no abbreviations.
ISAKMP SA (phase 1) hash algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 hash {md5|sha1|sha256|sha384|sha512}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
hash algorithm.
• Not specifying the hash algorithm displays the current setting.
ISAKMP SA (phase 1) encryption algorithm setting
msh> ipsec ike {1|2|3|4|default} ph1 encrypt {des|3des|aes128|aes192|aes256}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
encryption algorithm.
• Not specifying an encryption algorithm displays the current setting.
ISAKMP SA (phase 1) Diffie-Hellman group setting
msh> ipsec ike {1|2|3|4|default} ph1 dhgroup {1|2|14}
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
Diffie-Hellman group number.
• Specify the group number to be used.
• Not specifying a group number displays the current setting.
ISAKMP SA (phase 1) validity period setting
msh> ipsec ike {1|2|3|4|default} ph1 lifetime "validity period"
• Enter the separate setting number [1-4] or [default] and specify the ISAKMP SA (phase 1)
validity period.
• Enter the validity period (in seconds) from 300 to 172800.
• Not specifying a validity period displays the current setting.
IPsec SA (phase 2) authentication algorithm setting
msh> ipsec ike {1|2|3|4|default} ph2 auth {hmac-md5|hmac-sha1|hmac-sha256|hmac-
sha384|hmac-sha512}
• Enter the separate setting number [1-4] or [default] and specify the IPsec SA (phase 2)
authentication algorithm.
5. Enhanced Network Security
106