Nortel 4134 Guia Do Utilizador
![Nortel](https://files.manualsbrain.com/attachments/41d8158aa9dad39109585817452a5513bedfdded/common/fit/150/50/b0df237683acfcba182fca1886fb0237fc1e06fba6e3e77a0d64d1463e4c/brand_logo.jpeg)
156
IPsec VPN configuration
Configuring hash algorithm for IPsec proposal for remote access
VPN
VPN
Configure the hash algorithm for the remote access IPsec proposal.
Procedure steps
Step
Action
1
To enter the configuration mode, enter:
configure terminal
2
To specify crypto configuration for IPsec and IKE, enter:
crypto
3
To specify configuration of dynamic IKE policies for remote access,
enter:
enter:
dynamic
4
To specify the remote access IPsec policy to configure, enter:
ipsec policy <name> {modecfg-group | l2tp-group}
5
To specify the IPsec proposal template to configure, enter:
proposal <1-5>
6
To configure the hash algorithm, enter:
hash-algorithm {md5-hmac | sha1-hmac | null}
—End—
Table 81
Variable definitions
Variable definitions
Variable
Value
md5
A 128-bit message digest-RFC 1321
sha1
Secure Hash Standard: A 160-bit message
digest-NIST,FIPS PUB 180-1
digest-NIST,FIPS PUB 180-1
null
No authentication
Configuring lifetime for IPsec proposal for remote access VPN
Configure the lifetime of the remote access IPsec SA. When the SA expires,
it is replaced by a new negotiated SA or terminated.
it is replaced by a new negotiated SA or terminated.
Procedure steps
Nortel Secure Router 4134
Security — Configuration and Management
NN47263-600
01.02
Standard
10.0
3 August 2007
Copyright © 2007, Nortel Networks
.