Cisco PIX-515E Quick Start Manual - Page 22

Browse online or download pdf Quick Start Manual for Network Hardware Cisco PIX-515E. Cisco PIX-515E 42 pages. Security appliance
Also for Cisco PIX-515E: Quick Start Manual (42 pages)

Cisco PIX-515E Quick Start Manual
Step 3: Configure the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy,
and an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels between two peers.
To specify the IKE policy, complete the following steps:
1. Select the Encryption (DES/3DES/AES), Authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5) used by the security appliance during an IKE security association.
Note
When configuring PIX 2, enter the exact values for each of the options that you chose for
PIX 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow
down the process.
2. Click the Next button to continue.
22