Cisco PIX-515E Manuale di avvio rapido - Pagina 22

Sfoglia online o scarica il pdf Manuale di avvio rapido per Hardware di rete Cisco PIX-515E. Cisco PIX-515E 42. Security appliance
Anche per Cisco PIX-515E: Manuale di avvio rapido (42 pagine)

Cisco PIX-515E Manuale di avvio rapido
Step 3: Configure the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy,
and an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels between two peers.
To specify the IKE policy, complete the following steps:
1. Select the Encryption (DES/3DES/AES), Authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5) used by the security appliance during an IKE security association.
Note
When configuring PIX 2, enter the exact values for each of the options that you chose for
PIX 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow
down the process.
2. Click the Next button to continue.
22