Download presentation
Presentation is loading. Please wait.
Published byAdrian McIntosh Modified over 11 years ago
1
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys
2
© 2006 Cisco Systems, Inc. All rights reserved. Lesson 4.3 Configure a Router with IPSec Using Pre-shared Keys Module 4: Configuring Site to Site VPN with Pre-shared keys
3
© 2006 Cisco Systems, Inc. All rights reserved. Configuring IPsec Step 1: Configure transform sets. Step 2: Configure global IPsec SA lifetimes. Step 3: Configure crypto ACLs Step 4: Configure crypto maps Step 5: Apply the crypto maps to the terminating / originating interface
4
© 2006 Cisco Systems, Inc. All rights reserved.
5
Step 2 – Create IKE policies
6
© 2006 Cisco Systems, Inc. All rights reserved.
8
Step 3: Purpose of Crypto ACLs The peer that initiates the negotiation sends all its policies to the remote peer, and the remote peer tries to find a match with its policies
9
© 2006 Cisco Systems, Inc. All rights reserved. ISAKMP Identity
10
© 2006 Cisco Systems, Inc. All rights reserved. Step 3 – Configure pre-shared keys
11
© 2006 Cisco Systems, Inc. All rights reserved. Step 4 – Purpose of Crypto Maps
12
© 2006 Cisco Systems, Inc. All rights reserved.
14
Step 5: Applying Crypto Maps to Interfaces
15
© 2006 Cisco Systems, Inc. All rights reserved.
16
Q and A
17
© 2006 Cisco Systems, Inc. All rights reserved.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.