
Chapter 9 Configuring Security Features
Configuring VPN
DETAILED STEPS
| Command or Action | Purpose |
Step 1 |
|
|
crypto isakmp policy priority | Creates an IKE policy that is used during IKE | |
| Example: | negotiation. The priority is a number from 1 to |
| 10000, with 1 being the highest. | |
| Router(config)# crypto isakmp policy 1 | Also enters the Internet Security Association Key |
| ||
| and Management Protocol (ISAKMP) policy | |
|
| |
|
| configuration mode. |
Step 2 |
|
|
encryption {des 3des aes aes 192 | Specifies the encryption algorithm used in the IKE | |
| aes 256} | policy. |
| Example: | The example specifies |
| standard (DES). | |
| ||
|
| |
|
| |
Step 3 |
|
|
hash {md5 sha} | Specifies the hash algorithm used in the IKE | |
| Example: | policy. |
| The example specifies the Message Digest 5 | |
| ||
| (MD5) algorithm. The default is Secure Hash | |
| ||
| standard | |
|
| |
Step 4 |
|
|
authentication | Specifies the authentication method used in the | |
| IKE policy. | |
| Example: | The example specifies a |
|
| |
|
| |
|
| |
|
| |
Step 5 |
|
|
group {1 2 5} | Specifies the | |
| Example: | an IKE policy. |
|
| |
|
| |
|
| |
Step 6 |
|
|
lifetime seconds | Specifies the lifetime, from 60 to 86400 seconds, | |
| Example: | for an IKE security association (SA). |
|
| |
|
| |
|
| |
Step 7 |
|
|
exit | Exits IKE policy configuration mode and enters | |
| Example: | global configuration mode. |
|
| |
|
| |
| Router(config)# |
|
|
|
|
Cisco 819 Series Integrated Services Routers Software Configuration Guide
|
| |
|