Chapter8 Site-to-Site VPN
Create Site to Site VPN
8-42
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Hash
The authentication algorithm to be used for the negotiation. SDM supports the
following algorithms:
SHA_1Secure Hash Algorithm. A hash algorithm used to authenticate
packet data.
MD5Message Digest 5. A hash algorithm used to authenticate packet data.
D-H Group
The Diffie-Hellman GroupDiffie-Hellman is a public-key cryptography
protocol that allows two routers to establish a shared secret over an unsecure
communications channel. SDM supports the following groups:
group1D-H Group 1. 768-bit D-H Group.
group2D-H Group 2. 1024-bit D-H Group. This group provides mor e
security than group 1, but requires more processing time.
group5D-H Group 5.1536-bit D-H Group. This group provides more
security than group 2, but requires more processing time.
Note Diffie-Hellman group5 is not supported on all routers.
Authentication
The authentication method to be used. The following value is supported:
PRE_SHAREAuthentication will be performed using pre-shared keys.
RSA_SIGAuthentication will be performed using digital certificates.
Type
Either SDM Default or User Defined. If no User Defined policies have been
created on the router, this window will show the default IKE policy.