IKE configuration task list
Prior to IKE configuration, you must determine the following parameters:
The strength of the algorithms for IKE negotiation (the security protection level), including the identity authentication method, encryption algorithm, authentication algorithm, and DH group. Different algorithms provide different levels of protection. A stronger algorithm means more resistant to decryption of protected data but requires more resources. Generally, the longer the key, the stronger the algorithm.
The pre-shared key or the PKI domain the certificate belongs to. For more information about PKI configuration, see the chapter "PKI configuration."
To configure IKE:
Task | Remarks |
---|---|
Optional. | |
Optional. Required if you want to specify an IKE proposal for an IKE peer to reference. | |
Required. | |
Optional. | |
Optional. | |
Optional. | |
Optional. |