You can use J-Web Quick Configuration to quickly configure IPsec phase 2 proposals.
Before You Begin |
---|
For background information, read
|
To configure an IPsec Phase 2 proposal with J-Web Quick Configuration:
Table 163: IPsec Phase 2 Proposal Options
Field |
Function |
Action |
---|---|---|
IPsec Proposal (Phase 2) | ||
Name |
Description of the Phase 2 proposal. |
Enter a name. |
Description |
Identify the proposal |
Enter a text description. |
Authentication algorithm |
Hash algorithm that authenticates packet data. It can be one of the following:
|
Select a hash algorithm. |
Encryption algorithm |
Configures an IKE encryption algorithm.
|
Select an encryption algorithm. |
Lifetime kilobytes |
The lifetime (in kilobytes) of an IPsec security association (SA). The SA is terminated when the specified number of kilobytes of traffic have passed. |
Enter a value from 64 through 1,048,576 bytes.
|
Lifetime seconds |
The lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA and security parameter index (SPI) or terminated. |
Enter a value from 180 through 86,400 seconds. |
Protocol |
The type of security protocol. |
Select a protocol for the proposal. |