|
|
This section is used to set certain Internet Security Association Key Management Protocol/Internet Key VPN 5000 concentrator and client or LAN-to-LAN tunneling devices will initally identify and authenticate each other so that tunnel sessions can then be established. This initial negotiation is referred to as Phase 1. These Phase 1 security parameters are global to the device and are not associated with a particular interface.
configure IKE PolicyAfter entering the configure command for the section, enter one or more of the following keywords.
Protection = {MD5_DES_G1 | MD5_3DES_G1 | MD5_DES_G2 | MD5_3DES_G2 | SHA_DES_G1 | SHA_3DES_G1 | SHA_DES_G2 | SHA_3DES_G2 } | The Protection keyword specifies a protection suite for the ISAKMP/IKE negotiation between the VPN 5000 concentrator and client, or between VPN routers which have been configured as LAN-to-LAN tunneling devices. This keyword may appear multiple times within this section, in which case the VPN 5000 concentrator or VPN router will propose all of the specified protection suites. The VPN 5000 Client or tunnel peer will accept one of the options for the negotiation. The first piece of each option is the authentication algorithm to be used for the negotiation.
The second piece is the encryption algorithm.
The third piece is the Diffie-Hellman group to be used for key exchange.
|
[ IKE Policy] Protection = MD5_DES_G1 Protection = SHA_3DES_G2
| Command | Description |
|---|---|
configure Tunnel Partner | Configures the LAN-to-LAN tunnel parameters |
configure VPN Group | Configures the VPN group parameters |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed Sep 27 10:38:17 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.