How to Manage IKE Policy
Last updated
Last updated
To view all of your IKE policies, follow the below steps:
Step 1: Login to your account.
Step 2: Navigate to Services and then click on My Services.
Step 3: Click on your project.
Step 4: Navigate to Networks and then click on VPN.
Step 5: Here, you can view all of your IKE policies.
To create an IKE policy, follow the below steps:
Step 1: Click on Add IKE Policy.
Step 2: Enter the details and click on Add.
To edit an IKE policy, follow the below steps:
Step 1: Choose the IKE policy you want to edit, click on Select, and choose Edit IKE from the drop-down menu.
Step 2: Update the details that you want to change and click on Submit.
You can delete an IKE policy by clicking on Select and then selecting Delete IKE from the drop-down menu.
To view an overview of IKE policy, follow the below steps:
Step 1: Click on the IKE policy name for which you want to view the overview.
Step 2: Here, you can view the overview of the selected IKE policy.
Field | Description |
---|---|
Name
Enter a unique name for the IKE policy.
Description
Enter a short explanation of the purpose or usage of the policy
Authorization algorithm
Select the algorithm used to authenticate the identity of peers. Common options include SHA1, SHA256, SHA384 and SHA512.
Encryption algorithm
Select the algorithm used to encrypt the data traffic. Common choices are 3DES, AES128, AES192 and AES256.
IKE version
Select the version of the IKE protocol to be used. Typically, this would be v1 or v2.
Lifetime units for IKE keys
Select the unit of time for which the IKE keys are valid before they need to be renegotiated.
Lifetime value for IKE keys
Enter the duration for which the IKE keys are valid. This is a numeric value that works in conjunction with the lifetime units.
Perfect Forward Secrecy:
Select the group. This feature ensures session keys are not compromised even if the server's private key is compromised. Common options are Group 2, Group 5, and Group 14.
IKE Phase1 negotiation mode:
Select the mode used for IKE Phase 1 negotiation. Options typically include Main mode or Aggressive mode, depending on the level of security and speed required.