EasyManua.ls Logo

Cisco ASA 5510 - Page 39

Cisco ASA 5510
62 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
39
Step 3: Configure the IKE Policy.
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy;
it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels between two peers.
To specify the IKE policy, perform the following steps:
1. Select the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5) used by the adaptive security appliance during an IKE security
association.
Note When configuring ASA 2, enter the exact values for each of the options that you chose for
ASA 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow
down the process.
2. Click Next to continue.

Related product manuals