6-8
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter6 VPN Wizards
IPsec Site-to-Site VPN Wizard
Traffic to Protects
This step lets you identify the local network and remote network These networks protect the traffic using
IPsec encryption.
Fields
Network Type—Choose IPv4 or IPv6.
Local Networks—Identify the host used in the IPsec tunnel.
Remote Networks—Identify the networks used in the IPsec tunnel.
Authentication Methods
This step lets you configure the methods to authenticate with the peer device.
Fields
IKE version 1
Pre-shared Key—Using a preshared key is a quick and easy way to set up communication with a
limited number of remote peers and a stable network. It may cause scalability problems in a large
network because each IPsec peer requires configuration information for each peer with which it
establishes secure connections.
Each pair of IPsec peers must exchange preshared keys to establish secure tunnels. Use a secure
method to exchange the preshared key with the administrator of the remote site.
Device Certificate—Click to use certificates for authentication between the local ASA and the
remote IPsec peer.
You can efficiently manage the security keys used to establish an IPsec tunnel with digital
certificates. A digital certificate contains information that identifies a user or device, such as a name,
serial number, company, department or IP address. A digital certificate also contains a copy of the
public key.
When two peers want to communicate, they exchange certificates and digitally sign data to
authenticate each other. When you add a new peer to the network, it enrolls with a CA, and none of
the other peers require additional configuration.
IKE version 2
Local Pre-shared Key—Specify IPsec IKEv2 authentication methods and encryption algorithms.
Local Device Certificate—Authenticates VPN access through the security appliance.
Remote Peer Pre-shared Key—Click to use a preshared key for authentication between the local
ASA and the remote IPsec peer.
Remote Peer Certificate Authentication—When checked, the peer device is allowed to use the
certificate to authenticate itself to this device.
Encryption Algorithm
This step lets you select the types of encryption algorithms used to protect the data.