Cisco ASA 5505 Getting Started Manual page 99

Adaptive security appliance
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 7
Scenario: IPsec Remote-Access VPN Configuration
To specify the IKE policy in Step 8 of the VPN Wizard, perform the following
steps:
Choose the Encryption (DES/3DES/AES), authentication algorithms
Step 1
(MD5/SHA), and the Diffie-Hellman group (1/2/5/7) used by the adaptive
security appliance during an IKE security association.
Click Next to continue.
Step 2
78-18003-02
Implementing the IPsec Remote-Access VPN Scenario
ASA 5505 Getting Started Guide
7-15

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents