Specifications
Chapter 3 Scenario: IPsec Remote-Access VPN Configuration
Implementing the IPsec Remote-Access VPN Scenario
3-14
PIX 515E Security Appliance Getting Started Guide
78-17645-01
To specify the IKE policy in Step 8 of the VPN Wizard, perform the following
steps:
Step 1 Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA),
and the Diffie-Hellman group (1/2/5/7) used by the
security appliance during an
IKE security association.
Step 2 Click Next to continue.