Cisco Cisco Packet Data Interworking Function (PDIF)
ISAKMP Policy Configuration
▀ Process Overview
▄ IPSec Reference, StarOS Release 18
64
Process Overview
The basic sequence of actions required to configure an ISAKMP is outlined below.
Step 1
Step 2
Step 3
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
Configuring ISAKMP Policy
Use the following example to create the ISAKMP policy on your system:
configure
context ctxt_name
ikev1 policy priority
encryption { 3des-cbc | des-cbc }
hash { md5 | sha1 }
group { 1 | 2 | 3 | 4 | 5 }
lifetime time
end
Notes:
ctxt_name is the system context in which you wish to create and configure the ISAKMP policy.
priority dictates the order in which the ISAKMP policies are proposed when negotiating IKE SAs.
For more information on parameters, refer to the ISAKMP Configuration Mode Commands chapter in the
Command Line Interface Reference.