Specifications
Chapter 8 Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
8-14
Cisco ASA 5580 Getting Started Guide
78-18101-01
In Step 7 of the VPN Wizard, perform the following steps:
Step 1 Enter the network configuration information to be pushed to remote clients.
Step 2 Click Next to continue.
Configuring the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of the
peers. In most cases, the ASDM default values are sufficient to establish secure
VPN tunnels.