Specifications
8-15
Cisco ASA 5580 Getting Started Guide
78-18101-01
Chapter 8 Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
To specify the IKE policy in Step 8 of the VPN Wizard, perform the following
steps:
Step 1 Choose the Encryption (DES/3DES/AES), authentication algorithms
(MD5/SHA), and the Diffie-Hellman group (1/2/5/7) used by the adaptive
security appliance during an IKE security association.
Step 2 Click Next to continue.
Configuring IPsec Encryption and Authentication Parameters
In Step 9 of the VPN Wizard, perform the following steps: