VPN Configuring IKE
1. Document your IKE Phase 1 negotiation criteria (example below)
§ Encryption algorithm: AES-128
§ Hashing: SHA-1
§ Authentication: pre-shared
§ Key exchange: Diffie-Hellman Group 2
2. Document your IPSec (IKE Phase 2) negotiation criteria (example below)
§ Encryption algorithm: esp-aes 128
§ Authentication: esp-sha-hmac
Configuring IKE Phase 1:
1. Enable ISAKMPE
| crypto isakmp enable |
2. Create ISAKMP Policy
| crypto isakmp policy 100 encryption aes 128 authentication pre-shared group 2 hash sha |
3. Configure ISAKMP Identity
| crypto isakmp identity |
4. Configure pre-shared keys
| crypto isakmp key |
Configuring IKE Phase 2:
1. Create transform sets
| crypto ipsec transform-set crypto ipsec transform-set JEREMY esp-aes 128 esp-sha-hmac |
2. Configure IPSec lifetime (optional)
| crypto ipsec security-association lifetime |
3. Create mirrored ACLs defining traffic to be encrypted and the traffic expected to be received encrypted
4. Configure IPSec crypto-map
| crypto map crypto map MAP 100 ipsec-isakmp match address set peer set pfs set transform-set |
Verify:
| show crypto isakmp policy |
0 Response to "VPN Configuring IKE"
Post a Comment