Cisco SA520-K9 Administration Guide - Page 144

Advanced Configuration of IPsec VPN, Viewing the Basic Setting Defaults for IPsec VPN

Page 144 highlights

Configuring VPN Advanced Configuration of IPsec VPN 7 Advanced Configuration of IPsec VPN The following topics are helpful for users who want to review and modify the settings that are created by the VPN Wizard. • Viewing the Basic Setting Defaults for IPsec VPN • Configuring the IKE Policies for IPsec VPN • Configuring the IPsec VPN Policies Viewing the Basic Setting Defaults for IPsec VPN To view the basic setting defaults that are configured by the Wizard, click VPN on the menu bar, and then click IPsec > Basic Setting Defaults. Configuring the IKE Policies for IPsec VPN The Internet Key Exchange (IKE) protocol is a negotiation protocol that includes an encryption method to protect data and ensure privacy. It is also an authentication method to verify the identity of devices that are trying to connect to your network. You can create IKE policies to define the security parameters such as authentication of the peer, encryption algorithms, etc. to be used in this process. You can choose whether to authenticate users from the User Database (see Configuring the User Database for the IPsec Remote Access VPN) or an external authentication server such as a RADIUS server (by choosing the IPsec Host option in the XAUTH field of this page. NOTE The VPN Wizard is the recommended method to create the corresponding IKE and VPN policies for a VPN tunnel. After the Wizard creates the matching IKE and VPN policies, you can make changes, as needed. Advanced users can create an IKE policy from Add but must be sure to use compatible encryption, authentication, and key-group parameters for the VPN policy. Cisco SA500 Series Security Appliances Administration Guide 144

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Configuring VPN
Advanced Configuration of IPsec VPN
Cisco SA500 Series Security Appliances Administration Guide
144
7
Advanced Configuration of IPsec VPN
The following topics are helpful for users who want to review and modify the
settings that are created by the VPN Wizard.
Viewing the Basic Setting Defaults for IPsec VPN
Configuring the IKE Policies for IPsec VPN
Configuring the IPsec VPN Policies
Viewing the Basic Setting Defaults for IPsec VPN
To view the basic setting defaults that are configured by the Wizard, click
VPN
on
the menu bar, and then click
IPsec > Basic Setting Defaults
.
Configuring the IKE Policies for IPsec VPN
The Internet Key Exchange (IKE) protocol is a negotiation protocol that includes an
encryption method to protect data and ensure privacy. It is also an authentication
method to verify the identity of devices that are trying to connect to your network.
You can create IKE policies to define the security parameters such as
authentication of the peer, encryption algorithms, etc. to be used in this process.
You can choose whether to authenticate users from the User Database (see
Configuring the User Database for the IPsec Remote Access VPN
) or an
external authentication server such as a RADIUS server (by choosing the IPsec
Host option in the XAUTH field of this page.
NOTE
The VPN Wizard is the recommended method to create the corresponding IKE and
VPN policies for a VPN tunnel. After the Wizard creates the matching IKE and VPN
policies, you can make changes, as needed. Advanced users can create an IKE
policy from
Add
but must be sure to use compatible encryption, authentication, and
key-group parameters for the VPN policy.