Cisco 515E - PIX Restricted Bundle Getting Started Manual page 69

Security appliance
Hide thumbs Also See for 515E - PIX Restricted Bundle:
Table of Contents

Advertisement

Chapter 4
Scenario: Site-to-Site VPN Configuration
Step 3
Configuring the IKE Policy
Step 1
78-17645-01
Click Next to continue.
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of
the peers. In most cases, the ASDM default values are sufficient to establish
secure VPN tunnels between two peers.
In Step 3 of the VPN Wizard, perform the following steps:
Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA),
and the Diffie-Hellman group (1/2/5) used by the security appliance during an
IKE security association.
Implementing the Site-to-Site Scenario
PIX 515E Security Appliance Getting Started Guide
4-7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 515e

Table of Contents