Cisco ESW-540-48 Administration Guide - Page 152

Configuring VPN, Configuring the IKE Policies for IPsec VPN, IPsec VPN Status,

Page 152 highlights

Configuring VPN Advanced Configuration of IPsec VPN 7 • Encryption Algorithm: Choose the algorithm that is used to encrypt the data. • Integrity Algorithm: Choose the algorithm that is used to verify the integrity of the data. • PFS Key Group: Check this box to enable Perfect Forward Secrecy (PFS) to improve security. While this option is slower, it ensures that a Diffie-Hellman exchange is performed for every phase-2 negotiation. • Select IKE Policy: Choose the IKE policy to define the characteristics of phase-1 of the negotiation. Configuring the IKE Policies for IPsec VPN, page 144. STEP 7 In the Redundant VPN Gateway Parameters area, enter the following information to create a backup policy for this policy: • Enable Redundant Gateway for this policy?: Check this box to make a backup policy for this policy. When the tunnel for this policy is down, the backup tunnel automatically becomes active. • Select Back- up Policy: Choose a policy to act as a backup of this policy. This list includes only those policies that can be configured as back up policies. NOTE A backup policy should meet the following conditions: 1. The Type should be Auto. 2. The DPD should be enabled. 3. The Direction should be either initiator or both. 4. The XAuth configuration should be None or IPsec Host. 5. The policy should be Gateway only, not client. • Failback time to switch from back-up to primary: Enter the number of seconds that must pass to confirm that primary tunnel has recovered from a failure. If the primary tunnel is up for the specified number of seconds, the security appliance will switch to the primary tunnel by disabling the backup tunnel. STEP 8 Click Apply to save your settings. NOTE Next steps: • To view the status of the VPN tunnels, click Status > VPN Status > IPsec Status. For more information, see IPsec VPN Status, page 210. • To view IPsec VPN logs, click Status > View Logs > IPsec VPN Logs. For more information, see IPsec VPN Logs, page 215. Cisco SA500 Series Security Appliances Administration Guide 152

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Configuring VPN
Advanced Configuration of IPsec VPN
Cisco SA500 Series Security Appliances Administration Guide
152
7
Encryption Algorithm:
Choose the algorithm that is used to encrypt the
data.
Integrity Algorithm:
Choose the algorithm that is used to verify the integrity
of the data.
PFS Key Group:
Check this box to enable Perfect Forward Secrecy (PFS) to
improve security. While this option is slower, it ensures that a Diffie-Hellman
exchange is performed for every phase-2 negotiation.
Select IKE Policy:
Choose the IKE policy to define the characteristics of
phase-1 of the negotiation.
Configuring the IKE Policies for IPsec VPN,
page 144
.
STEP
7
In the
Redundant VPN Gateway Parameters
area, enter the following information
to create a backup policy for this policy:
Enable Redundant Gateway for this policy?:
Check this box to make a
backup policy for this policy. When the tunnel for this policy is down, the
backup tunnel automatically becomes active.
Select Back- up Policy:
Choose a policy to act as a backup of this policy.
This list includes only those policies that can be configured as back up
policies.
NOTE
A backup policy should meet the following conditions:
1. The Type should be Auto.
2. The DPD should be enabled.
3. The Direction should be either initiator or both.
4. The XAuth configuration should be None or IPsec Host.
5. The policy should be Gateway only, not client.
Failback time to switch from back-up to primary:
Enter the number of
seconds that must pass to confirm that primary tunnel has recovered from a
failure. If the primary tunnel is up for the specified number of seconds, the
security appliance will switch to the primary tunnel by disabling the backup
tunnel.
STEP
8
Click
Apply
to save your settings.
NOTE
Next steps:
To view the status of the VPN tunnels, click
Status
> VPN Status > IPsec
Status
. For more information, see
IPsec VPN Status, page 210
.
To view IPsec VPN logs, click
Status
> View Logs > IPsec VPN Logs
. For
more information, see
IPsec VPN Logs, page 215
.