Cisco OL-4015-08 User Manual page 331

Cisco router and security device manager user's guide
Table of Contents

Advertisement

Chapter 14
Internet Key Exchange
Hash
Authentication
Type
What Do You Want to Do?
If you want to:
Learn more about IKE policies.
Add an IKE policy to the router's
configuration.
SDM provides a default IKE policy, but
there is no guarantee that the peer has
the same policy. You should configure
other IKE policies so that the router is
able to offer an IKE policy that the peer
can accept.
Edit an existing IKE policy.
Remove an IKE policy from the
router's configuration.
OL-4015-08
The authentication algorithm for negotiation. There are two possible values:
Secure Hash Algorithm (SHA)
Message Digest 5 (MD5)
The authentication method to be used.
Pre-SHARE. Authentication will be performed using pre-shared keys.
RSA_SIG. Authentication will be performed using digital signatures.
Either SDM_DEFAULT or User Defined. SDM_DEFAULT policies cannot be
edited.
Do this:
See
Click Add, and configure a new IKE policy in the Add IKE
policy window.
Choose the IKE policy that you want to edit, and click Edit.
Then edit the IKE policy in the Edit IKE policy window.
Default IKE policies are read only. They cannot be edited.
Choose the IKE policy that you want to remove, and click
Remove.
Cisco Router and Security Device Manager Version 2.2 User's Guide
More About IKE
Policies.
Internet Key Exchange (IKE)
14-47

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents