Phase 1 and 2 cipher
, click
Change
and configure ciphers manually. It can be necessary if you
want to connect Kerio Control with the third party firewall. For details, see
Configuring IKE ciphers
.
8.
Save the settings.
Configuring ciphers in key exchange (IKE)
NOTE
New in Kerio Control 9.2!
Kerio Control can use several IKE ciphers during the connecting and authorizing process of IPsec tunnel. In many cases,
these ciphers are common between the endpoints and no custom configuration is necessary.
In other cases, you may need to assign custom ciphers. Therefore, you can configure IKE ciphers in Kerio Control
manually:
Do'stlaringiz bilan baham: |