Cisco Systems ISA550 Manual De Usuario

Descargar
Página de 479
VPN
Configuring a Site-to-Site VPN
Cisco ISA500 Series Integrated Security Appliances Administration Guide
349
8
 
If you only want to create the IPsec VPN policy and do not want to 
immediately activate the connection after the settings are saved, click the 
Do Not Activate button. The connection will be triggered by any traffic that 
matches the IPsec VPN policy and the VPN tunnel will be set up 
automatically. You can also click the Connect icon to manually establish the 
VPN connection.
STEP 8
Click Save to apply your settings. 
Configuring IKE Policies
The Internet Key Exchange (IKE) protocol is a negotiation protocol that includes an 
encryption method to protect data and ensure privacy. It is also an authentication 
method to verify the identity of devices that are trying to connect to your network. 
You can create IKE policies to define the security parameters (such as 
authentication of the peer, encryption algorithms, and so forth) to be used for a 
VPN tunnel. 
NOTE
Up to 16 IKE policies can be configured on the security appliance. 
STEP 1
Click VPN > Site-to-Site > IKE Policies
The IKE Policies window opens. The default and custom IKE policies are listed in 
the table.
STEP 2
To add a new IKE policy, click Add
Other options: To edit an entry, click the Edit (pencil) icon. To delete an entry, click 
the Delete (x) icon. To delete multiple entries, check them and click Delete. The 
default IKE policy (DefaultIke) cannot be edited or deleted. 
The IKE Policy - Add/Edit window opens.
STEP 3
Enter the following information:
Name: Enter the name for the IKE policy. 
Encryption: Choose the algorithm used to negotiate the security 
association. There are four algorithms supported by the security appliance: 
ESP_3DES, ESP_AES_128, ESP_AES_192, and ESP_AES_256. 
Hash: Specify the authentication algorithm for the VPN header. There are 
two hash algorithms supported by the security appliance: SHA1 and MD5.