Configure The Ike Policy - Cisco 1812W - Integrated Services Router Wireless Configuration Manual

1800 series integrated services routers
Hide thumbs Also See for 1812W - Integrated Services Router Wireless:
Table of Contents

Advertisement

Chapter 6
Configuring a VPN Using Easy VPN and an IPSec Tunnel
An example showing the results of these configuration tasks is shown in the section
Example."
The procedures in this chapter assume that you have already configured basic router features as well as
Note
PPPoE or PPPoA with NAT, DCHP and VLANs. If you have not performed these configurations tasks,
see
Chapter 4, "Configuring PPP over ATM with NAT,"
and VLANs"

Configure the IKE Policy

Perform these steps to configure the Internet Key Exchange (IKE) policy, beginning in global
configuration mode:
Command or Action
Step 1
crypto isakmp policy priority
Example:
Router(config)# crypto isakmp policy 1
Router(config-isakmp)#
Step 2
encryption {des | 3des | aes | aes 192 | aes 256}
Example:
Router(config-isakmp)# encryption 3des
Router(config-isakmp)#
Step 3
hash {md5 | sha}
Example:
Router(config-isakmp)# hash md5
Router(config-isakmp)#
Step 4
authentication {rsa-sig | rsa-encr | pre-share}
Example:
Router(config-isakmp)# authentication
pre-share
Router(config-isakmp)#
Step 5
group {1 | 2 | 5}
Example:
Router(config-isakmp)# group 2
Router(config-isakmp)#
OL-6426-02
Chapter 1, "Basic Router Configuration," Chapter 3, "Configuring PPP over Ethernet with NAT,"
as appropriate for your router.
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
and
Chapter 5, "Configuring a LAN with DHCP
Purpose
Creates an IKE policy that is used during IKE
negotiation. The priority is a number from 1 to
10000, with 1 being the highest.
Also enters the Internet Security Association Key
and Management Protocol (ISAKMP) policy
configuration mode.
Specifies the encryption algorithm used in the IKE
policy.
The example specifies 168-bit data encryption
standard (DES).
Specifies the hash algorithm used in the IKE
policy.
The example specifies the Message Digest 5
(MD5) algorithm. The default is Secure Hash
standard (SHA-1).
Specifies the authentication method used in the
IKE policy.
The example specifies a pre-shared key.
Specifies the Diffie-Hellman group to be used in
an IKE policy.
Configure the IKE Policy
"Configuration
6-3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents