Cisco SRP521W-K9-G1 Administration Guide - Page 184

Configuring VPN, IKE Policy Settings, Field, Description, Submit, General, IKE SA Parameters, AES128

Page 184 highlights

Configuring VPN IKE Policy 7 STEP 5 Set the IKE SA parameters as needed as defined in the IKE Policy Settings table. STEP 6 If connected to a XAUTH server, enter a username and password. When enabled, the SRP can authenticate users from an external authentication server such as a RADIUS server. STEP 7 Click Submit to save your settings. IKE Policy Settings Field Description General Policy Name Enter a unique name for the VPN policy. Exchange Mode Choose the exchange mode based on your requirements for security and speed. • Main: Choose this mode if you want higher security, but with a slower connection. Main Mode relies upon two-way key exchanges between the initiator and the receiver. The key-exchange process slows down the connection but increases security. • Aggressive: Choose this mode if you want a faster connection, but with lowered security. In Aggressive Mode there are fewer key exchanges between the initiator and the receiver. Both sides exchange information even before there is a secure channel. IKE SA Parameters Encryption Algorithm Choose an encryption mode. Select from DES, 3DES, AES128, AES192, and AES256. Authentication Algorithm Choose an authentication algorithm for the IKA SA. Select from MD5 and SHA1. Pre Shared Key Enter an alpha-numeric key to be shared with the IKE peer. Diffie-Hellman (DH) Group Choose a DH group to set the strength of the algorithm in bits. Select from Group 1 (768 bits) and Group 2 (1024bits). Cisco SRP500 Series Services Ready Platforms Administration Guide (SRP520 Models) 184

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229

Configuring VPN
IKE Policy
Cisco SRP500 Series Services Ready Platforms Administration Guide (SRP520 Models)
184
7
STEP
5
Set the IKE SA parameters as needed as defined in the
IKE Policy Settings
table.
STEP
6
If connected to a XAUTH server, enter a username and password. When enabled,
the SRP can authenticate users from an external authentication server such as a
RADIUS server.
STEP
7
Click
Submit
to save your settings.
IKE Policy Settings
Field
Description
General
Policy Name
Enter a unique name for the VPN policy.
Exchange Mode
Choose the exchange mode based on your
requirements for security and speed.
Main
: Choose this mode if you want higher security, but
with a slower connection. Main Mode relies upon two-way
key exchanges between the initiator and the receiver. The
key-exchange process slows down the connection but
increases security.
Aggressive
: Choose this mode if you want a faster
connection, but with lowered security. In Aggressive
Mode there are fewer key exchanges between the
initiator and the receiver. Both sides exchange information
even before there is a secure channel.
IKE SA Parameters
Encryption
Algorithm
Choose an encryption mode. Select from
DES
,
3DES
,
AES128
,
AES192
, and
AES256
.
Authentication
Algorithm
Choose an authentication algorithm for the IKA SA.
Select from
MD5
and
SHA1
.
Pre Shared Key
Enter an alpha-numeric key to be shared with the IKE
peer.
Diffie-Hellman (DH)
Group
Choose a DH group to set the strength of the algorithm
in bits. Select from
Group 1 (768 bits)
and
Group 2
(1024bits)
.