Overview

The next major task in configuring Cisco IOS IPSec is to configure the IKE parameters that you gathered earlier. This lesson describes the steps that are used to configure IKE policies.

Relevance

A major task in configuring IPSec is to configure the proper IKE parameters that are used in IKE policies.

Objectives

Upon completing this lesson, you will be able to: List the steps to configure IKE

Identify the command that is used to enable or disable ISAKMP Identify the command that is used to define an IKE policy Identify the command that is used to set ISAKMP parameters Describe the process and commands in IKE policy negotiation

■ Identify the command that is used to configure the ISAKMP identity Identify the command that is used to configure a preshared authentication key Identify the command to verify IKE configuration

Learner Skills and Knowledge

To benefit fully from this lesson, you must have these prerequisite skills and knowledge:

■ All knowledge presented in the Introduction to Cisco Networking Technologies (INTRO) course

All knowledge presented in the Interconnecting Cisco Network Devices (ICND) course

Outline

This lesson includes these topics:

■ IKE Configuration

■ Step 2: Create IKE Policies

■ IKE Policy Creation with the crypto isakmp Command

■ IKE Policy Negotiation

■ Step 3: Configure ISAKMP Identity

■ Step 4: Configure Preshared Keys

■ Step 5: Verify IKE Configuration Summary

0 0

Post a comment