Chapter 7 Scenario:
Implementing the
In Step 7 of the VPN Wizard, perform the following steps:
Step 1 Enter the network configuration information to be used by remote clients.
Step 2 Click Next to continue.
Configure the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy; it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default values are sufficient to establish secure VPN tunnels.
| Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide |
|