Configuration Examples For Implementing Ike Security Protocol - Cisco CRS-1 - Carrier Routing System Router Configuration Manual

Ios xr system security configuration guide
Hide thumbs Also See for CRS-1 - Carrier Routing System Router:
Table of Contents

Advertisement

Configuration Examples for Implementing IKE Security Protocol

Configuration Examples for Implementing IKE Security Protocol
This section provides the following configuration examples:
Creating IKE Policies: Example
This example shows how to create two IKE policies with policy 15 as the highest priority, policy 20 as
the next priority, and the existing default priority as the lowest priority.
crypto isakmp policy 15
crypto isakmp policy 20
In the example, the encryption des of policy 20 would not appear in the written configuration because
this is the default value for the encryption algorithm parameter.
If the show crypto isakmp policy command is issued with this configuration, the output is as follows:
Protection suite priority 15
Protection suite priority 20
Default protection suite
Although the output shows "no volume limit" for the lifetimes, you can configure only a time lifetime
Note
(such as 86,400 seconds); volume-limit lifetimes are not configurable.
Cisco IOS XR System Security Configuration Guide for the Cisco CRS-1 Router
SC-144
Creating IKE Policies: Example, page 144
Configuring a service-ipsec Interface with a Dynamic Profile: Example, page 145
Limiting an IKE Peer to a Particular Policy Set Based on Local IP Address: Example, page 145
Configuring Cisco Easy VPN with a Local AAA-Method Server: Example, page 146
Configuring Cisco Easy VPN with a Remote AAA-Method Server: Example, page 147
Configuring a Local ISAKMP Profile for Preshared Keys in ISAKMP Keyrings: Example, page 148
Configuring VRF-Aware: Example, page 148
encryption 3des
hash md5
authentication rsa-sig
group 2
lifetime 5000
authentication pre-share
lifetime 10000
encryption algorithm:3DES - Data Encryption Standard (168 bit keys)
hash algorithm:Message Digest 5
authentication method:Rivest-Shamir-Adelman Signature
Diffie-Hellman group:#2 (1024 bit)
lifetime:5000 seconds, no volume limit
encryption algorithm:DES - Data Encryption Standard (56 bit keys)
hash algorithm:Secure Hash Standard
authentication method:preshared Key
Diffie-Hellman group:#1 (768 bit)
lifetime:10000 seconds, no volume limit
encryption algorithm:DES - Data Encryption Standard (56 bit keys)
hash algorithm:Secure Hash Standard
authentication method:Rivest-Shamir-Adelman Signature
Diffie-Hellman group:#1 (768 bit)
lifetime:86400 seconds, no volume limit
Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
OL-20382-01

Advertisement

Table of Contents
loading

Table of Contents