Chapter11 Site-to-Site VPN
Create Site to Site VPN
11-8
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Details
Click this button to obtain details about the interface you selected. The details
window shows any access rules, IPSec policies, Network Address Translation
(NAT) rules, or Inspection rules associated with the interface. To examine any of
these rules in more detail, go to Additional Tasks/ACL Editor, and examine them
in the Rules windows.
Destination
IP address and Subnet Mask. Enter the IP address and subnet mask of the
destination for this traffic. For more information about how to enter values in
these fields, see IP Addresses and Subnet Masks.
The destination is depicted as the Remote router in the Use Case Scenario diagram
in the main VPN wizard window.
IKE Proposals
This window lists all the Internet Key Exchange (IKE) policies that have been
configured on the router. If no user-defined policies have been configured, the
windows lists the Cisco SDM default IKE policy. IKE policies govern the way that
devices in a VPN authenticate themselves.
The local router will use the IKE policies listed in this window to negotiate
authentication with the remote router.
The local router and the peer device must both use the same policy. The router that
initiates the VPN connection offers the policy with the lowest priority number
first. If the remote system rejects that policy, the local router offers the policy with
the next lowest number, and continues in this fashion until the remote system
accepts. You must coordinate closely with the administrator of the peer system so
that you can configure identical policies on both routers.
For Easy VPN connections, IKE policies are only configured on the E asy VPN
server. The Easy VPN client sends proposals, and the server responds according
to its configured IKE policies.
Priority
This is the order in which the policy will be offered during negotiation.