Cisco Systems ISA550 Manual De Usuario

Descargar
Página de 479
VPN
Configuring a Site-to-Site VPN
Cisco ISA500 Series Integrated Security Appliances Administration Guide
351
8
 
Configuring Transform Sets
A transform set specifies the algorithms of integrity and encryption that the peer 
will use to protect data communications. Two peers must use the same algorithm 
to communicate. 
NOTE
Up to 16 transform sets can be configured on the security appliance. 
STEP 1
Click VPN > Site-to-Site > Transform Policies.
The Transform Sets window opens. The default and custom transform sets are 
listed in the table. 
STEP 2
To add a new transform set, click Add.
Other options: To edit an entry, click the Edit (pencil) icon. To delete an entry, click 
the Delete (x) icon. To delete multiple entries, check them and click Delete. The 
default transform set (DefaultTrans) cannot be edited or deleted. 
The Transform Set - Add/Edit window opens.
STEP 3
Enter the following information:
Name: Enter the name for the transform set. 
Integrity: Choose the HASH algorithm used to ensure the data integrity. It 
ensures that a packet comes from where it says it comes from, and that it has 
not been modified in transit. 
-
ESP_SHA1_HMAC: Authentication with SHA1 (160-bit).
-
ESP_MD5_HMAC: Authentication with MD5 (128-bit). MD5 has a smaller 
digest and is considered to be slightly faster than SHA1. A successful (but 
extremely difficult) attack against MD5 has occurred; however, the HMAC 
variant that IKE uses prevents this attack.
Encryption: Choose the symmetric encryption algorithm that protects data 
transmission between two IPsec peers. The default is ESP_3DES. The 
Advanced Encryption Standard supports key lengths of 128, 192, 256 bits. 
-
ESP_3DES: Encryption with 3DES (168-bit).
-
ESP_AES_128: Encryption with AES (128-bit).
-
ESP_AES_192: Encryption with AES (192-bit).
-
ESP_AES_256: Encryption with AES (256-bit).
STEP 4
Click OK to save your settings.