Cisco 5510 Getting Started Guide - Page 157

Providing Information About the Remote VPN Peer, Pre-Shared Key, Certificate

Page 157 highlights

Chapter 12 Scenario: Site-to-Site VPN Configuration c. Click Next to continue. Implementing the Site-to-Site Scenario Providing Information About the Remote VPN Peer The VPN peer is the system on the other end of the connection that you are configuring, usually at a remote site. Note In this scenario, the remote VPN peer is referred to as Security Appliance 2. In Step 2 of the VPN Wizard, perform the following steps: Step 1 Step 2 Enter the Peer IP Address (the IP address of Security Appliance 2, in this scenario 209.165.200.236) and a Tunnel Group Name (for example "Cisco"). Specify the type of authentication that you want to use by selecting one of the following authentication methods: • To use a static preshared key for authentication, click the Pre-Shared Key radio button and enter a preshared key (for example, "Cisco"). This key is used for IPsec negotiations between the adaptive security appliances. Note When using preshared key authentication, the Tunnel Group Name must be the IP address of the peer. • To use digital certificates for authentication, click the Certificate radio button, choose the certificate signing algorithm from the Certificate Signing Algorithm drop-down list, and then choose a preconfigured trustpoint name from the Trustpoint Name drop-down list. If you want to use digital certificates for authentication but have not yet configured a trustpoint name, you can continue with the Wizard by using one of the other two options. You can revise the authentication configuration later using the standard ASDM screens. • Click the Challenge/Response Authentication radio button to use that method of authentication. 78-19186-01 Cisco ASA 5500 Series Getting Started Guide 12-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

12-5
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Chapter 12
Scenario: Site-to-Site VPN Configuration
Implementing the Site-to-Site Scenario
c.
Click
Next
to continue.
Providing Information About the Remote VPN Peer
The VPN peer is the system on the other end of the connection that you are
configuring, usually at a remote site.
Note
In this scenario, the remote VPN peer is referred to as Security Appliance 2.
In Step 2 of the VPN Wizard, perform the following steps:
Step 1
Enter the Peer IP Address (the IP address of Security Appliance 2, in this scenario
209.165.200.236) and a Tunnel Group Name (for example “Cisco”).
Step 2
Specify the type of authentication that you want to use by selecting one of the
following authentication methods:
To use a static preshared key for authentication, click the
Pre-Shared Key
radio button and enter a preshared key (for example, “Cisco”). This key is
used for IPsec negotiations between the adaptive security appliances.
Note
When using preshared key authentication, the Tunnel Group Name
must be the IP address of the peer.
To use digital certificates for authentication, click the
Certificate
radio
button, choose the certificate signing algorithm from the Certificate Signing
Algorithm drop-down list, and then choose a preconfigured trustpoint name
from the Trustpoint Name drop-down list.
If you want to use digital certificates for authentication but have not yet
configured a trustpoint name, you can continue with the Wizard by using one
of the other two options. You can revise the authentication configuration later
using the standard ASDM screens.
Click the
Challenge/Response Authentication
radio button to use that
method of authentication.