Cisco 7100 Series Spezifikationen Seite 43

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 112
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 42
Intranet VPN Business Scenario 3-13
Configuring IKE Policies
Note This section only contains basic configuration information for enabling encryption
services on the GRE tunnel configured in the “Step 1—Configuring the Tunnel” section on
page 3-4. Refer to the “IP Security and Encryption” part of the Security Configuration
Guide and the Security Command Reference publications for detailed configuration
information on IPSec, IKE, and CA.
Refer to the Integrated Service Adapter and Integrated Service Module Installation and
Configuration publication for detailed configuration information on the ISM.
Configuring IKE Policies
IKE is enabled by default. IKE does not have to be enabled for individual interfaces, but is
enabled globally for all interfaces in the router. You must create IKE policies at each peer.
An IKE policy defines a combination of security parameters to be used during the IKE
negotiation.
You can create multiple IKE policies, each with a different combination of parameter
values. If you do not configure any IKE policies, the router uses the default policy, which
is always set to the lowest priority, and which contains each parameter’s default value.
Foreach policythat you create, you assign a unique priority (1 through 10,000,with1 being
the highest priority). You can configure multiple policies on each peer—but at least one of
these policies must contain exactly the same encryption, hash, authentication, and
Diffie-Hellman parameter values as one of the policies on the remote peer. If you do not
specify a value for a parameter, the default value is assigned.
Note The default policy and the default values for configured policies do not show up in
the configuration when you issue a show running-config EXEC command. Instead, to see
the default policy and any default values within configured policies, use the show crypto
isakmp policy EXEC command.
This section contains basic steps to configure IKE policies and includes the followingtasks:
1 Creating Policies
2 Additional Configuration Required for IKE Policies
3 Verifying IKE Policies
Seitenansicht 42
1 2 ... 38 39 40 41 42 43 44 45 46 47 48 ... 111 112

Kommentare zu diesen Handbüchern

Keine Kommentare