
12
Cisco VPN 3000 Series Concentrators Interoperability Profile
Configuring an IKE Proposal
Figure 8 Configuration | System | Tunneling Protocols | IPSec | IKE Proposals | Add Screen
Step 3 In the Proposal Name field, enter a unique name for this IKE proposal. The maximum length is 48
characters. Entries are case-sensitive and spaces are allowed.
Step 4 From the Authentication Mode drop-down menu, choose Preshared Keys to authenticate the remote
peer.
Step 5 From the Authentication Algorithm drop-down menu, choose SHA/HMAC-160 to use SHA-1 for
authenticating the source of the data traveling across the tunnel.
Step 6 From the Encryption Algorithm drop-down menu, choose 3DES-168 to use Triple DES encryption.
Step 7 From the Diffie-Hellman Group drop-down menu, choose Group 2 (1024-bits), which is
MODP group 2.
Step 8 From the Lifetime Measurement drop-down menu, choose Time.
Step 9 In the Time Lifetime box, enter 28800, replacing the default value.
Step 10 Click Add to apply your changes. The Manager returns to the Configuration | System | Tunneling
Protocols | IPSec | IKE Proposals screen.
Activating and Prioritizing the IKE Proposal
The Configuration | System | Tunneling Protocols | IPSec | IKE Proposals screen now includes the new
IKE proposal as the last entry in the Inactive Proposals box, shown in Figure 9. You need to activate and
prioritize this IKE proposal.
Comentarios a estos manuales