Chapter 9
Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
Click Next to continue.
Step 2
Configuring the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of the
peers. In most cases, the ASDM default values are sufficient to establish secure
VPN tunnels.
Cisco ASA 5500 Series Getting Started Guide
9-12
78-19186-01