Chapter 6
IKE Overview ..............................................................................................140
IKE Policies ...........................................................................................142
Priority ...........................................................................................142
Encryption ......................................................................................143
Hash Function ................................................................................143
Lifetime ..........................................................................................144
IKE SA Negotiation ................................................................................144
Configuration Tasks .....................................................................................145
Refreshing SAs ......................................................................................159
Configuration Notes ..............................................................................160
Monitoring IPSec .........................................................................................168
System Event Logs ................................................................................168
show Commands ..................................................................................169
Overview .....................................................................................................177
User Authentication ..............................................................................180
References ..................................................................................................181
Table of Contents
177
xiii
Table of Contents