Cisco 5510 Getting Started Guide - Page 119
Choose the Encryption DES/3DES/AES, authentication algorithms
UPC - 882658094767
View all Cisco 5510 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 119 highlights
Chapter 9 Scenario: IPsec Remote-Access VPN Configuration Implementing the IPsec Remote-Access VPN Scenario To specify the IKE policy in Step 8 of the VPN Wizard, perform the following steps: Step 1 Choose the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), and the Diffie-Hellman group (1/2/5/7) used by the adaptive security appliance during an IKE security association. Step 2 Click Next to continue. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 9-13
9-13
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 9
Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
To specify the IKE policy in Step 8 of the VPN Wizard, perform the following
steps:
Step 1
Choose the Encryption (DES/3DES/AES), authentication algorithms
(MD5/SHA), and the Diffie-Hellman group (1/2/5/7) used by the adaptive
security appliance during an IKE security association.
Step 2
Click
Next
to continue.