EasyManuals Logo
Home>Cisco>Firewall>ASA 5510

Cisco ASA 5510 User Manual

Cisco ASA 5510
62 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #31 background imageLoading...
Page #31 background image
31
Step 8: Configure the IKE Policy.
IKE is a negotiation protocol that includes an encryption method to protect data and ensure privacy;
it is also an authentication method to ensure the identity of the peers. In most cases, the ASDM default
values are sufficient to establish secure VPN tunnels.
To specify the IKE policy, perform the following steps:
1. Select the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), and the
Diffie-Hellman group (1/2/5/7) used by the adaptive security appliance during an IKE security
association.
2. Click Next to continue.

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA 5510 and is the answer not in the manual?

Cisco ASA 5510 Specifications

General IconGeneral
BrandCisco
ModelASA 5510
CategoryFirewall
LanguageEnglish

Related product manuals