Configuring VPN
Configuring Advanced VPN Setup
Cisco CVR100W Wireless-N VPN Router Administration Guide 105
6
Managing IKE Policies
The Internet Key Exchange (IKE) protocol dynamically exchanges keys between
two IPsec hosts. You can create IKE policies to define the security parameters,
such as authentication of the peer and encryption algorithms, to be used in this
process. Be sure to use compatible encryption, authentication, and key-group
parameters for the VPN policy.
To manage IKE policies:
STEP 1 Choose VPN > Advanced VPN Setup.
In the IKE Policy Table area, all existing IKE policies used for the VPN policies are
displayed.
STEP 2 To create a new IKE policy, click Add Row.
Other options: To edit an IKE policy, choose an entry and click Edit. To delete an
IKE policy, choose an entry and click Delete.
NOTE You cannot delete an IKE policy if it is being used in a VPN policy. You must
first disable and delete the VPN policy in the VPN Policy table.
STEP 3 Enter the following information:
Policy Name Enter a unique name for the policy for identification and
management purposes. The VPN policy name cannot
be same as the username of an existing VPN client.
Exchange Mode Choose one of the following options:
• Main Mode: This mode negotiates the tunnel
with higher security, but is slower.
• Aggressive Mode: This mode establishes a
faster connection, but with lowered security.
Respondent Mode Check Enable to set the CVR100W to work as a VPN
respondent. The CVR100W can only receive the VPN
request from remote VPN peer.