Cisco PIX-515E Skrócona instrukcja obsługi - Strona 22
Przeglądaj online lub pobierz pdf Skrócona instrukcja obsługi dla Sprzęt sieciowy Cisco PIX-515E. Cisco PIX-515E 42 stron. Security appliance
Również dla Cisco PIX-515E: Skrócona instrukcja obsługi (42 strony)
Step 3: Configure the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy,
and an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels between two peers.
To specify the IKE policy, complete the following steps:
1. Select the Encryption (DES/3DES/AES), Authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5) used by the security appliance during an IKE security association.
Note
When configuring PIX 2, enter the exact values for each of the options that you chose for
PIX 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow
down the process.
2. Click the Next button to continue.
22