Cisco 5510 Getting Started Guide - Page 118
Configuring the IKE Policy
UPC - 882658094767
View all Cisco 5510 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 118 highlights
Implementing the IPsec Remote-Access VPN Scenario Chapter 9 Scenario: IPsec Remote-Access VPN Configuration Step 2 Click Next to continue. Configuring the IKE Policy IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy; it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default values are sufficient to establish secure VPN tunnels. 9-12 Cisco ASA 5500 Series Getting Started Guide 78-19186-01
Chapter 9
Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
9-12
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Step 2
Click
Next
to continue.
Configuring the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of the
peers. In most cases, the ASDM default values are sufficient to establish secure
VPN tunnels.