14-47
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Chapter14 Internet Key Exchange
Internet Key Exchange (IKE)
Hash
The authentication algorithm for negotiation. There are two possible values:
Secure Hash Algorithm (SHA)
Message Digest 5 (MD5)
Authentication
The authentication method to be used.
Pre-SHARE. Authentication will be performed using pre-shared keys.
RSA_SIG. Authentication will be performed using digital signatures.
Type
Either SDM_DEFAULT or User Defined. SDM_DEFAULT policies cannot be
edited.
What Do You Want to Do?
If you want to: Do this:
Learn more about IKE policies. See More About IKE Policies.
Add an IKE policy to the routers
configuration.
SDM provides a default IKE policy, but
there is no guarantee that the peer h as
the same policy. You should configure
other IKE policies so that the router is
able to offer an IKE policy that the peer
can accept.
Click Add, and configure a new IKE policy in the Add IKE
policy window.
Edit an existing IKE policy. Choose the IKE policy that you want to edit, and click Edit.
Then edit the IKE policy in the Edit IKE policy window.
Default IKE policies are read only. They cannot be edited.
Remove an IKE policy from the
routers configuration.
Choose the IKE policy that you want to remove, and click
Remove.