Patton electronic SmartNode 4110 Series ユーザーズマニュアル

ページ / 664
Key management (IKE)
371
SmartWare Software Configuration Guide 
32 • VPN configuration
can optionally also specify a security association lifetime for IKE security associations. If the lifetime of the 
security association expires, IKE will automatically negotiate a new security association. The default lifetime 
for ISPEC security associations is one hour without any limit on the transmitted data volume. The parameters 
defined in this profile are used for the negotiation of IPSEC security associations in quick mode.
The following commands can be used to change the security association lifetime:
Mode: profile ipsec-transform <transform-name>
Creating an ISAKMP transform profile
To define which cryptographic transforms should be used to protect the negotiation of IPsec security associa-
tion and the mutual authentication of the IPSEC peers, you need to create at least one isakmp transform pro-
file. The parameters defined in this profile are used for the negotiation of ISAKMP security associations in 
main mode.
The following commands can be used to create and configure an ISAKMP transform profile:
Mode: configure
Step
Command
Purpose
1
(optional)
node(pf-ipstr)[ctx-name]# key-life-
time-seconds <seconds>
Define a new maximum lifetime of the security 
associations in seconds.
2
(optional)
node(pf-ipstr)[ctx-name]# key-life-
time-kilobytes <kilobytes>
Define a new maximum lifetime of the security 
associations in kilobytes.
Step
Command
Purpose
1
node(cfg)# profile isakmp-transform 
<name>
Create the transform profile with the specified 
name and enter its configuration mode.
2
node(pf-ikptr)[<name>]# authentica-
tion-algorithm md5|sha1
Define the authentication algorithm to be used, 
which can be either md5 or sha1.
3
node(pf-ikptr)[<name>]# encryption 
des-cbc|3des-cbc|aes-cbc [key-
length]
Define the encryption and optionally the length 
of the encryption keys in bits to be used.
4
(optional)
node(pf-ikptr)[<name>]# key-life-
time-seconds <seconds>
Optionally, you can also change the default 
ISAKMP security association lifetime in seconds. 
The default lifetime is 1 day. 
5
(optional)
node(pf-ikptr)[<name>]# key-life-
time-sessions <sessions>
Optionally, you can also change the default 
ISAKMP security association lifetime in sessions. 
This is the maximum number of quick modes, 
which can be created by the ISAKMP SA. By 
default there is no limit on the number of ses-
sions.