hit counter script

Configuring Ike Policies - Cisco ISA550 Administration Manual

Isa500 series integrated security appliances
Hide thumbs Also See for ISA550:
Table of Contents

Advertisement

VPN
Configuring a Site-to-Site VPN
STEP 8
NOTE
STEP 1
STEP 2
STEP 3
Cisco ISA500 Series Integrated Security Appliances Administration Guide
If you only want to create the IPsec VPN policy and do not want to
immediately activate the connection after the settings are saved, click the
Do Not Activate button. The connection will be triggered by any traffic that
matches the IPsec VPN policy and the VPN tunnel will be set up
automatically. You can also click the Connect icon to manually establish the
VPN connection.
Click Save to apply your settings.

Configuring IKE Policies

The Internet Key Exchange (IKE) protocol is a negotiation protocol that includes an
encryption method to protect data and ensure privacy. It is also an authentication
method to verify the identity of devices that are trying to connect to your network.
You can create IKE policies to define the security parameters (such as
authentication of the peer, encryption algorithms, and so forth) to be used for a
VPN tunnel.
Up to 16 IKE policies can be configured on the security appliance.
Click VPN > Site-to-Site > IKE Policies.
The IKE Policies window opens. The default and custom IKE policies are listed in
the table.
To add a new IKE policy, click Add.
Other options: To edit an entry, click the Edit (pencil) icon. To delete an entry, click
the Delete (x) icon. To delete multiple entries, check them and click Delete. The
default IKE policy (DefaultIke) cannot be edited or deleted.
The IKE Policy - Add/Edit window opens.
Enter the following information:
Name: Enter the name for the IKE policy.
Encryption: Choose the algorithm used to negotiate the security
association. There are four algorithms supported by the security appliance:
ESP_3DES, ESP_AES_128, ESP_AES_192, and ESP_AES_256.
Hash: Specify the authentication algorithm for the VPN header. There are
two hash algorithms supported by the security appliance: SHA1 and MD5.
8
299

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isa550wIsa570Isa570w

Table of Contents