EasyManua.ls Logo

Cisco IOS XR

Cisco IOS XR
254 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
How to Implement IKE Security Protocol Configurations for IPSec Networks
SC-35
Cisco IOS XR System Security Configuration Guide
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 2
crypto isakmp policy
priority
Example:
RP/0/RP0/CPU0:router(config)# crypto isakmp
policy 5
Identifies the policy to create.
Each policy is uniquely identified by the priority
number you assign.
This command places the router in ISAKMP policy
configuration mode.
Step 3
encryption {des | 3des | aes | aes 192 | aes
256}
Example:
RP/0/RP0/CPU0:router(config-isakmp)# encryption
aes
Specifies the encryption algorithm.
Step 4
hash {sha | md5}
Example:
RP/0/RP0/CPU0:router(config-isakmp)# hash md5
Specifies the hash algorithm.
Step 5
authentication {pre-share | rsa-sig | rsa-encr}
Example:
RP/0/RP0/CPU0:router(config-isakmp)#
authentication rsa-sig
Specifies the authentication method.
Step 6
group {1 | 2 | 5}
Example:
RP/0/RP0/CPU0:router(config-isakmp)# group 5
Specifies the Diffie-Hellman group identifier.
Step 7
lifetime
seconds
Example:
RP/0/RP0/CPU0:router(config-isakmp)# lifetime
50000
Specifies the lifetime of the security association. The range,
in seconds, is from 60 to 86400.

Table of Contents

Related product manuals