Configuring The Ike Policy - Cisco ASA 5505 Getting Started Manual

Adaptive security appliance
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 8
Scenario: Site-to-Site VPN Configuration
Step 3

Configuring the IKE Policy

Step 1
78-17612-02
Click Next to continue.
IKE is a negotiation protocol that includes an encryption method to protect data
integrity through secure VPN tunnels and ensure privacy; it also provides
authentication to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels between two peers.
In Step 3 of the VPN Wizard, perform the following steps:
Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA),
and the Diffie-Hellman group (1/2/5) used by the adaptive security appliance
during an IKE security association.
Implementing the Site-to-Site Scenario
Cisco ASA 5505 Getting Started Guide
8-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents