Specifications
3-13
PIX 515E Security Appliance Getting Started Guide
78-17645-01
Chapter 3 Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
In Step 7 of the VPN Wizard, perform the following steps:
Step 1 Enter the network configuration information to be pushed to remote clients.
Step 2 Click Next to continue.
Configuring the IKE Policy
IKE is a negotiation protocol that includes an encryption method to protect data
and ensure privacy; it is also an authentication method to ensure the identity of
the peers. In most cases, the ASDM default values are sufficient to establish
secure VPN tunnels.