Ike Profiles - Cisco ROUTER-SDM-CD User Manual

User guide
Table of Contents

Advertisement

Internet Key Exchange (IKE)
IP Address/Subnet Mask
User Authentication [Xauth]

IKE Profiles

IKE Profiles
Cisco Router and Security Device Manager 2.5 User's Guide
18-8
These fields appear if you selected "IP Address" in the Peer field. Enter the IP
address of a network or subnet in the IP Address field. The pre-shared key will
apply to all peers in that network or subnet. For more information, refer to
Addresses and Subnet
Enter a subnet mask if the IP address you entered is a subnet address, and not the
address of a specific host.
Check this box if site-to-site VPN peers use XAuth to authenticate themselves. If
Xauth authenticationn is enabled in VPN Global Settings, it is enabled for
site-to-site peers as well as for Easy VPN connections.
IKE
profiles, also called
parameters that you can associate with one or more IPSec tunnels. An IKE profile
applies parameters to an incoming IPSec connection identified uniquely through
its concept of match identity criteria. These criteria are based on the IKE identity
that is presented by incoming IKE connections and includes IP address, fully
qualified domain name (FQDN), and group (the virtual private network [VPN]
remote client grouping).
For more information on ISAKMP profiles, and how they are configured using the
Cisco IOS CLI, go to Cisco.com and follow this path:
Products and Services > Cisco IOS Software > Cisco IOS Security > Cisco
IOS IPSec > Product Literature > White Papers > ISAKMP Profile Overview
The IKE Profiles area of the screen lists the configured IKE profiles and includes
the profile name, the IPSec profile it is used by, and a description of the profile if
one has beenprovided. If no IPSec profile uses the selected IKE profile, the value
<none> appears in the Used By column.
When you create an IKE profile from this window, the profile is displayed in the
list. When you use the Easy VPN server wizard to create a configuration, IKE
profiles are created automatically, named by SDM, and displayed in this list.
Masks.
ISAKMP
profiles, enable you to define a set of IKE
Chapter 18
Internet Key Exchange
OL-4015-12
IP

Advertisement

Table of Contents
loading

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents