Configuring Ip Security Policies; Configuring Ike Policies - Cisco RV 120W Administration Manual

Wireless-n vpn firewall
Hide thumbs Also See for RV 120W:
Table of Contents

Advertisement

Configuring Virtual Private Networks (VPNs) and Security
Configuring VPNs
STEP 1
STEP 2
STEP 3
STEP 1
STEP 2
STEP 3
Cisco RV 120W Administration Guide

Configuring IP Security Policies

The VPN Wizard is the recommended method to configure corresponding IKE and
VPN policies for establishing a VPN tunnel. Once the Wizard creates the matching
IKE and VPN policies, you can modify the required fields using the Edit button.
Advanced users can create an IKE policy from the Add button, but must be sure to
use compatible encryption, authentication, and key-group parameters for the VPN
policy.

Configuring IKE Policies

The Internet Key Exchange (IKE) protocol dynamically exchanges keys between
two IPsec hosts. You can create IKE policies to define the security parameters
such as authentication of the peer, encryption algorithms, etc. to be used in this
process.
To configure IKE Policies:.
Choose VPN > IPsec > IPsec Policies.
In the IKE Policies Table, click Add.
Enter the information in the following sections and press Save.
General Information
Under Policy Name, enter a unique name for the policy for identification and
management purposes.
Under Direction/Type, choose one of the following connection methods:
Initiator—The router will initiate the connection to the remote end.
Responder—The router will wait passively and respond to remote IKE
requests.
Both—The router will work in either Initiator or Responder mode.
Under Exchange Mode, choose one of the following options:
Main mode—This mode negotiates the tunnel with higher security, but is
slower.
Aggressive mode—This mode establishes a faster connection, but with
lowered security.
5
105

Advertisement

Table of Contents
loading

Table of Contents