Cisco 5510 Getting Started Guide - Page 158
Click the Encryption DES/3DES/AES, authentication algorithms MD5/SHA, Step 3
UPC - 882658094767
View all Cisco 5510 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 158 highlights
Implementing the Site-to-Site Scenario Chapter 12 Scenario: Site-to-Site VPN Configuration Step 3 Click Next to continue. Configuring the IKE Policy IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy; it also provides authentication to ensure the identity of the peers. In most cases, the ASDM default values are sufficient to establish secure VPN tunnels between two peers. In Step 3 of the VPN Wizard, perform the following steps: Step 1 Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), and the Diffie-Hellman group (1/2/5) used by the adaptive security appliance during an IKE security association. 12-6 Cisco ASA 5500 Series Getting Started Guide 78-19186-01
Chapter 12
Scenario: Site-to-Site VPN Configuration
Implementing the Site-to-Site Scenario
12-6
Cisco ASA 5500 Series Getting Started Guide
78-19186-01
Step 3
Click
Next
to continue.
Configuring the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it also provides authentication to ensure the identity of the
peers. In most cases, the ASDM default values are sufficient to establish secure
VPN tunnels between two peers.
In Step 3 of the VPN Wizard, perform the following steps:
Step 1
Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA),
and the Diffie-Hellman group (1/2/5) used by the adaptive security appliance
during an IKE security association.