
4
• Determine the strength of the algorithms for IKE negotiation, namely the security protection level,
including the identity authentication method, encryption algorithm, authentication algorithm, and
DH group. Different algorithms provide different levels of protection. A stronger algorithm means
more resistant to decryption of protected data but requires more resources. Generally, the longer
the key, the stronger the algorithm.
• Determine the pre-shared key or the PKI domain the certificate belongs to. For PKI configuration,
refer to PKI in the Firewall WEB.
Complete the following tasks to configure IKE:
Task Remarks
Configuring a Name for the Local Security Gateway Optional
Configuring an IKE Proposal
Optional
Required if you want to specify an IKE
proposal for an IKE peer to reference.
Configuring an IKE Peer Required
Setting Keepalive Timers Optional
Setting the NAT Keepalive Timer Optional
Configuring a DPD Optional
Disabling Next Payload Field Checking Optional
Configuring a Name for the Local Security
Gateway
If the IKE negotiation initiator uses the gateway name as its identification for IKE negotiation (that is, the
id-type name command is configured on the initiator), you must configure a name for the local security
gateway by using the ike local-name command in system view or local-name command in IKE peer view.
If you perform the configuration in both views, the name configured in IKE peer view is used.
Following these steps to configure a name for the local security gateway:
To do… Use the command… Remarks
Enter system view system-view —
Configure a name for the local
security gateway
ike local-name name
Optional
By default, the device name is used
as the name of the local security
gateway.
Configuring an IKE Proposal
An IKE proposal defines a set of attributes describing how IKE negotiation should take place. You may
create multiple IKE proposals with different preferences. The preference of an IKE proposal is represented
by its sequence number, and the lower the sequence number, the higher the preference.
Two peers must have at least one matching IKE proposal for successful IKE negotiation. During IKE
negotiation, the initiator sends its IKE proposals to the peer, and the peer searches its own IKE proposals
Kommentare zu diesen Handbüchern