
Step 3—Configuring Encryption
Cisco 7100 Series VPN Configuration Guide
3-16
• Preshared keys authentication method:
If you specify preshared keys as the authentication method in a policy, you must
configure these preshared keys as described in the following section “Configuring
Preshared Keys.”
If RSA encryption is configured and signature mode is negotiated, the peer will request
both signature and encryption keys. Basically, the router will request as many keys as the
configuration will support. If RSA encryption is not configured, it will just request a
signature key.
Configuring Preshared Keys
To configure preshared keys, perform these tasks at each peer that uses preshared keys in
an IKE policy:
1 Set each peer’s ISAKMP identity. Each peer’s identity should be set to either its host
name or by its IP address. By default, a peer’s identity is set to its IP address.
2 Specify the shared keys at each peer. Note that a given preshared key is shared between
twopeers. At a given peer,you could specify the same keyto share with multiple remote
peers; however, a more secure approach is to specify different keys to share between
different pairs of peers.
To specify preshared keys at a peer, complete the following steps in global configuration
mode:
Step Command Purpose
1
hq-sanjose(config)# crypto isakmp
identity address
At the local peer: Specify the ISAKMP identity
(address or hostname) the headquarters router will
use when communicating with the remote office
router during IKE negotiations. This example
specifies the address keyword, which uses IP
address 172.17.2.4 (serial interface 1/0 of the
headquarters router) as the identity for the
headquarters router.
Comentarios a estos manuales