Chapter 4 Configuring the VSA
Configuration Tasks
Step 5
Step 6
Command | Purpose |
|
|
(Optional) Specifies the hash algorithm within an IKE policy. | |
| • |
| algorithm. |
| • |
| algorithm. |
| Note If this command is not enabled, the default value (sha) |
| will be used. |
|
|
(Optional) Specifies the | |
| within an IKE policy. |
| |
| |
| |
| Note If this command is not enabled, the default value |
| will be used. |
|
|
For detailed information on creating IKE policies, refer to the “Configuring Internet Key Exchange Security Protocol” chapter in the Security Configuration Guide publication.
Disabling VSA (Optional)
The VSA is enabled by default.
To disable the VSA, use the following commands, starting in global configuration mode:
| Command | Purpose |
|
|
|
Step 7 | no crypto engine [slot accelerator] 0 | Disables VSA. |
| Note The VSA can only be inserted in slot 0. |
|
|
|
|
Step 8 | crypto engine [slot accelerator] 0 | VSA will be enabled after the next |
|
| system reboot. |
|
|
|
|
|
|
This completes the procedure for disabling and preparing to enable VSA after the next system reboot.
Configuring a Transform Set
See the Advanced Encryption Standard (AES) feature module for more information on configuring a transform set.
This section includes the following topics:
•Defining a Transform Set
•IPSec Protocols: AH and ESP
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
|
| |
|