Chapter 3
Scenario: IPsec Remote-Access VPN Configuration
Step 1
Step 2
Configuring the IKE Policy
78-17645-01
In Step 7 of the VPN Wizard, perform the following steps:
Enter the network configuration information to be pushed to remote clients.
Click Next to continue.
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of
the peers. In most cases, the ASDM default values are sufficient to establish
secure VPN tunnels.
Implementing the IPsec Remote-Access VPN Scenario
PIX 515E Security Appliance Getting Started Guide
3-13