Cisco ASA 5505 Configuration Manual page 1286

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Creating IKE Policies
Hash—Choose the hash algorithm that ensures data integrity. It ensures that a packet comes from whom
you think it comes from, and that it has not been modified in transit.
sha
md5
Authentication—Choose the authentication method the adaptive security appliance uses to establish the
identity of each IPsec peer. Preshared keys do not scale well with a growing network but are easier to set
up in a small network. The choices follow:
pre-share
rsa-sig
crack
D-H Group—Choose the Diffie-Hellman group identifier, which the two IPsec peers use to derive a
shared secret without transmitting it to each other.
1
2
5
Lifetime (secs)—Either choose Unlimited or type an integer for the SA lifetime. The default is 86,400
seconds or 24 hours. With longer lifetimes, the adaptive security appliance sets up future IPsec security
associations more quickly. Encryption strength is great enough to ensure security without using very fast
rekey times, on the order of every few minutes. We recommend that you accept the default.
Time Measure—Choose a time measure. The adaptive security appliance accepts the following values:.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode
Routed
Cisco ASA 5500 Series Configuration Guide using ASDM
63-6
SHA-1
The default is SHA-1. MD5 has a smaller digest and is considered to
be slightly faster than SHA-1. A successful (but extremely difficult)
MD5
attack against MD5 has occurred; however, the HMAC variant IKE
uses prevents this attack.
Preshared keys.
A digital certificate with keys generated by the RSA signatures algorithm.
IKE Challenge/Response for Authenticated Cryptographic Keys protocol for mobile
IPsec-enabled clients which use authentication techniques other than certificates.
Group 1 (768-bit)
The default, Group 2 (1024-bit Diffie-Hellman) requires less
CPU time to execute but is less secure than Group 2 or 5.
Group 2 (1024-bit
Group 5 (1536-bit)
120 - 86,400 seconds
2 - 1440 minutes
1 - 24 hours
1 day
Security Context
Transparent Single
Chapter 63
Multiple
Context
System
Configuring IKE, Load Balancing, and NAC
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents