Download Print this page

Cisco PIX-515-RPS - PIX 515-R - Firewall Quick Start Manual page 22

Security appliance

Advertisement

Step 3: Configure the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy,
and an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels between two peers.
To specify the IKE policy, complete the following steps:
1. Select the Encryption (DES/3DES/AES), Authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5) used by the security appliance during an IKE security association.
Note
When configuring PIX 2, enter the exact values for each of the options that you chose for
PIX 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow
down the process.
2. Click the Next button to continue.
22

Advertisement

loading

This manual is also suitable for:

Pix 515e