O'Reilly logo

SECUR Exam Cram™ 2 (Exam 642-501) by Ken Edelman, Raman Sud

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Creating IKE Policies

The IKE policies you configure are in fact security policies that will be used to secure traffic flowing across the IKE Phase 1 tunnel. Remember, no user data traffic flows across the IKE Phase 1 tunnel. This tunnel is simply used to securely negotiate the IKE Phase 2 tunnel, which is another name for the IPSec tunnel.

The commands you use to create an IKE Phase 1 security policy follow:

crypto isakmp policy priority
  encryption {des | 3des}
  hash {sha | md5}
  authentication {rsa-sig | rsa-encr | pre-share}
  group {1 | 2 | 5}
  lifetime seconds
					

If you are using IOS Release 12.2(13)T or later, you will also see additional encryption options supported for the Advanced Encryption Standard (AES). The AES keywords are {aes | aes ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required