Chapter 12
Tunneling and VPNs
RUGGEDCOM ROX II
CLI User Guide
416 Adding an IKE Algorithm
Section12.8.7.2
Adding an IKE Algorithm
To add a new algorithm for the Internet Key Exchange (IKE) protocol, do the following:
1. Make sure the CLI is in Configuration mode.
2. Add the algorithm by typing:
tunnel ipsec connection connection ike algorithm cipher method modpgroup
Where:
• connection is the name of the connection.
• cipher is the cipher algorithm. Options include 3des, aes, aes128, aes192, aes256 and any. The
default is aes. The option any selects the default.
• method is the hash method. Options include any, md5, sha1 and sha2. The default is sha1. The option
any selects the default.
• modpgroup is the value of the Modular Exponential (MODP) group. Options include any, modp1024,
modp1536, modp2048, modp3072, modp4096, modp6144 and modp8192. The default is modp2048. The
option any selects the default.
3. Type commit and press Enter to save the changes, or type revert and press Enter to abort.
Section12.8.7.3
Deleting an IKE Algorithm
To delete an algorithm for the Internet Key Exchange (IKE) protocol, do the following:
1. Make sure the CLI is in Configuration mode.
2. Delete the algorithm by typing:
no tunnel ipsec connection connection ike algorithm cipher method modpgroup
Where:
• connection is the name of the connection.
• cipher is the cipher algorithm. Options include 3des, aes, aes128, aes192, aes256 and any. The
default is aes. The option any selects the default.
• method is the hash method. Options include any, md5, sha1 and sha2. The default is sha1. The option
any selects the default.
• modpgroup is the value of the Modular Exponential (MODP) group. Options include any, modp1024,
modp1536, modp2048, modp3072, modp4096, modp6144 and modp8192. The default is modp2048. The
option any selects the default.
3. Type commit and press Enter to save the changes, or type revert and press Enter to abort.