Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.

Similar presentations


Presentation on theme: "© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys."— Presentation transcript:

1 © 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys

2 © 2006 Cisco Systems, Inc. All rights reserved. Lesson 4.3 Configure a Router with IPSec Using Pre-shared Keys Module 4: Configuring Site to Site VPN with Pre-shared keys

3 © 2006 Cisco Systems, Inc. All rights reserved. Configuring IPsec Step 1: Configure transform sets. Step 2: Configure global IPsec SA lifetimes. Step 3: Configure crypto ACLs Step 4: Configure crypto maps Step 5: Apply the crypto maps to the terminating / originating interface

4 © 2006 Cisco Systems, Inc. All rights reserved.

5 Step 2 – Create IKE policies

6 © 2006 Cisco Systems, Inc. All rights reserved.

7

8 Step 3: Purpose of Crypto ACLs The peer that initiates the negotiation sends all its policies to the remote peer, and the remote peer tries to find a match with its policies

9 © 2006 Cisco Systems, Inc. All rights reserved. ISAKMP Identity

10 © 2006 Cisco Systems, Inc. All rights reserved. Step 3 – Configure pre-shared keys

11 © 2006 Cisco Systems, Inc. All rights reserved. Step 4 – Purpose of Crypto Maps

12 © 2006 Cisco Systems, Inc. All rights reserved.

13

14 Step 5: Applying Crypto Maps to Interfaces

15 © 2006 Cisco Systems, Inc. All rights reserved.

16 Q and A

17 © 2006 Cisco Systems, Inc. All rights reserved.


Download ppt "© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys."

Similar presentations


Ads by Google