Avaya 3.7 Manuel D’Utilisation

Page de 326
Using the VPN tabs
Issue 4 May 2005
141
Figure 47: VPN, Members [IP Groups] Tab
Security (IKE) tab
The Security (IKE) tab is used for configuring the encryption and authentication algorithms used 
at the end-points of a VPN tunnel. The configuration procedure involves setting a lifetime for 
public-keys, and a specific Diffie-Hellman Group for automatically generating keys of a specific 
strength. For additional protection, unique (new) keys are automatically generated and 
exchanged between all security gateways and VPNremote Clients in the VPN Object based on 
their lifetime.