Configuring The Ike Policy - Cisco ASA 5505 Getting Started Manual

Adaptive security appliance
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Implementing the IPsec Remote-Access VPN Scenario
Step 1
Step 2

Configuring the IKE Policy

ASA 5505 Getting Started Guide
7-14
In Step 7 of the VPN Wizard, perform the following steps:
Enter the network configuration information to be pushed to remote clients.
Click Next to continue.
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of
the peers. In most cases, the ASDM default values are sufficient to establish
secure VPN tunnels.
Chapter 7
Scenario: IPsec Remote-Access VPN Configuration
78-18003-02

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents