68-12
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter68 Configuring IKE, Load Balancing, and NAC
Configuring IPsec
Authentication Modes:
Preshared Keys
X.509 Digital Certificates
Diffie-Hellman Groups 1, 2, and 5.
Encryption Algorithms:
AES-128, -192, and -256
3DES-168
DES-56
ESP-NULL
Extended Authentication (XAuth)
Mode Configuration (also known as ISAKMP Configuration Method)
Tunnel Encapsulation Mode
IP compression (IPCOMP) using LZS
Adding Crypto Maps
This pane shows the currently configured crypto maps, including the IPsec rules. Use it to add, edit,
delete and move up, move down, cut, copy, and paste an IPsec rule.
Fields
Note You cannot edit, delete, or copy an implicit rule. The ASA implicitly accepts the traffic selection
proposal from remote clients when configured with a dynamic tunnel policy. You can override it by
giving a specific traffic selection.
Add—Click to launch the Create IPsec Rule dialog box, where you can configure basic, advanced,
and traffic selection parameters for a rule.
Edit—Click to edit an existing rule.
Delete—Click to delete a rule highlighted in the table.
Cut—Deletes a highlighted rule in the table and keeps it in the clipboard for copying.
Copy—Copies a highlighted rule in the table.
Find—Click to enable the Find toolbar where you can specify the parameters of existing rules that
you want to find:
Filter—Filter the find results by selecting Interface, Source, Destination, Destination Service,
or Rule Query, selecting is or contains, and entering the filter parameter. Click ... to launch a
browse dialog box that displays all existing entries that you can choose.
Diagram—Displays a diagram that illustrates the highlighted IPsec rule.
Type: Priority—Displays the type of rule (static or dynamic) and its priority.
Traffic Selection
#—Indicates the rule number.