Cisco Systems C819GUK9 Router User Manual


 
13-4
Cisco 819 Integrated Services Routers Software Configuration Guide
OL-23590-02
Chapter 13 Configuring a VPN Using Easy VPN and an IPSec Tunnel
Configuration Tasks
6. lifetime seconds
7. exit
DETAILED STEPS
Command or Action Purpose
Step 1
crypto isakmp policy priority
Example:
Router(config)# crypto isakmp policy 1
Router(config-isakmp)#
Creates an IKE policy that is used during IKE
negotiation. The priority is a number from 1 to
10000, with 1 being the highest.
Also enters the Internet Security Association Key
and Management Protocol (ISAKMP) policy
configuration mode.
Step 2
encryption {des | 3des | aes | aes 192 |
aes 256}
Example:
Router(config-isakmp)# encryption 3des
Router(config-isakmp)#
Specifies the encryption algorithm used in the IKE
policy.
The example specifies 168-bit data encryption
standard (DES).
Step 3
hash {md5 | sha}
Example:
Router(config-isakmp)# hash md5
Router(config-isakmp)#
Specifies the hash algorithm used in the IKE
policy.
The example specifies the Message Digest 5
(MD5) algorithm. The default is Secure Hash
standard (SHA-1).
Step 4
authentication {rsa-sig | rsa-encr |
pre-share}
Example:
Router(config-isakmp)# authentication
pre-share
Router(config-isakmp)#
Specifies the authentication method used in the
IKE policy.
The example specifies a pre-shared key.
Step 5
group {1 | 2 | 5}
Example:
Router(config-isakmp)# group 2
Router(config-isakmp)#
Specifies the Diffie-Hellman group to be used in
an IKE policy.
Step 6
lifetime seconds
Example:
Router(config-isakmp)# lifetime 480
Router(config-isakmp)#
Specifies the lifetime, 60 to 86400 seconds, for an
IKE security association (SA).
Step 7
exit
Example:
Router(config-isakmp)# exit
Router(config)#
Exits IKE policy configuration mode and enters
global configuration mode.