Avaya 3.7 Manuel D’Utilisation
![Avaya](https://files.manualsbrain.com/attachments/539de53b12b0cfce0bb8cf1e3bb961e969d9f556/common/fit/150/50/0bfb423b07b431ecf5ac095ccde7771f5eac50e962dfba59f8e256280b3d/brand_logo.png)
Using the VPN tabs
Issue 4 May 2005
141
Figure 47: VPN, Members [IP Groups] Tab
Security (IKE) tab
The Security (IKE) tab is used for configuring the encryption and authentication algorithms used
at the end-points of a VPN tunnel. The configuration procedure involves setting a lifetime for
public-keys, and a specific Diffie-Hellman Group for automatically generating keys of a specific
strength. For additional protection, unique (new) keys are automatically generated and
exchanged between all security gateways and VPNremote Clients in the VPN Object based on
their lifetime.
at the end-points of a VPN tunnel. The configuration procedure involves setting a lifetime for
public-keys, and a specific Diffie-Hellman Group for automatically generating keys of a specific
strength. For additional protection, unique (new) keys are automatically generated and
exchanged between all security gateways and VPNremote Clients in the VPN Object based on
their lifetime.