Step 8: Configure The Ike Policy - Cisco ASA 5510 Quick Start Manual

Adaptive security appliance asa 5500 series
Hide thumbs Also See for Cisco ASA 5510:
Table of Contents

Advertisement

Step 8: Configure the IKE Policy.

IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy;
it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels.
To specify the IKE policy, perform the following steps:
Select the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), and the
1.
Diffie-Hellman group (1/2/5/7) used by the adaptive security appliance during an IKE security
association.
Click Next to continue.
2.
31

Advertisement

Table of Contents
loading

This manual is also suitable for:

Cisco asa 5520Cisco asa 5540

Table of Contents