18-3
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Chapter 18 Internet Key Exchange
Internet Key Exchange (IKE)
Hash
The authentication algorithm for negotiation. There are two possible values:
• Secure Hash Algorithm (SHA)
• Message Digest 5 (MD5)
Authentication
The authentication method to be used.
• Pre-SHARE. Authentication will be performed using pre-shared keys.
• RSA_SIG. Authentication will be performed using digital signatures.
Type
Either SDM_DEFAULT or User Defined. SDM_DEFAULT policies cannot be
edited.
What Do You Want to Do?
If you want to: Do this:
Learn more about IKE policies. See More About IKE Policies.
Add an IKE policy to the router’s
configuration.
Cisco SDM provides a default IKE
policy, but there is no guarantee that the
peer has the same policy. You should
configure other IKE policies so that the
router is able to offer an IKE policy that
the peer can accept.
Click Add, and configure a new IKE policy in the Add IKE
policy window.
Edit an existing IKE policy. Choose the IKE policy that you want to edit, and click Edit.
Then edit the IKE policy in the Edit IKE policy window.
Default IKE policies are read only. They cannot be edited.
Remove an IKE policy from the
router’s configuration.
Choose the IKE policy that you want to remove, and click
Remove.