EasyManuals Logo

Cisco PIX-515E User Manual

Cisco PIX-515E
42 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #24 background imageLoading...
Page #24 background image
24
Step 3 Configure the IKE Policy
This step is comprised of two windows:
1. Configure the IKE negotiation parameters.
In most cases, the default values are sufficient to establish secure VPN tunnels between two peers.
a. Select the Encryption (DES/3DES/AES), Authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5) used by the PIX 515E during an IKE security association.
Confirm all values before moving to the next window.
Note When configuring PIX 2, enter the exact values for each of the options that you
selected for PIX 1. Encryption mismatches are a common cause of VPN tunnel
failures and can slow down the process.
b. Click the Next button to continue.

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco PIX-515E and is the answer not in the manual?

Cisco PIX-515E Specifications

General IconGeneral
Concurrent Sessions130, 000
Stateful InspectionYes
Maximum Connections130, 000
RAM128 MB
Flash Memory16 MB
Power SupplyInternal AC
Operating SystemCisco PIX OS
Interfaces6 x 10/100 Ethernet
High AvailabilityYes
Weight15 lbs
Firewall TypeStateful Packet Inspection
Form FactorRackmount
VPN ThroughputUp to 100 Mbps (3DES)

Related product manuals