27-4
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 27 Configuring IPSec and ISAKMP
Configuring ISAKMP
Each configuration supports a maximum of 20 ISAKMP policies, each with a different set of values.
Assign a unique priority to each policy you create. The lower the priority number, the higher the priority.
When ISAKMP negotiations begin, the peer that initiates the negotiation sends all of its policies to the
remote peer, and the remote peer tries to find a match. The remote peer checks all of the peer's policies
against each of its configured policies in priority order (highest priority first) until it discovers a match.
A match exists when both policies from the two peers contain the same encryption, hash, authentication,
and Diffie-Hellman parameter values, and when the remote peer policy specifies a lifetime less than or
equal to the lifetime in the policy the initiator sent. If the lifetimes are not identical, the security
appliance uses the shorter lifetime. If no acceptable match exists, ISAKMP refuses negotiation and the
SA is not established.
There is an implicit trade-off between security and performance when you choose a specific value for
each parameter. The level of security the default values provide is adequate for the security requirements
of most organizations. If you are interoperating with a peer that supports only one of the values for a
parameter, your choice is limited to that value.
crypto isakmp policy group
1
Group 1 (768-bit)
Specifies the Diffie-Hellman group
identifier, which the two IPSec peers use to
derive a shared secret without transmitting
it to each other.
With the exception of Group 7, the lower
the Diffie-Hellman group no., the less CPU
time it requires to execute. The higher the
Diffie-Hellman group no., the greater the
security.
Cisco VPN Client Version 3.x or higher
requires a minimum of Group 2. (If you
configure DH Group 1, the Cisco VPN
Client cannot connect.)
AES support is available on security
appliances licensed for VPN-3DES only. To
support the large key sizes required by AES,
ISAKMP negotiation should use
Diffie-Hellman (DH) Group 5.
Designed for devices with low processing
power, such as PDAs and mobile
telephones, Group 7 provides the greatest
security. The Certicom Movian Client
requires Group 7.
2 (default)
Group 2 (1024-bit)
5
Group 5 (1536-bit)
7
Group 7 (Elliptical
curve field size is 163
bits.)
crypto isakmp policy lifetime
integer value
(86400 =
default)
120 to 2147483647
seconds
Specifies the SA lifetime. The default is
86,400 seconds or 24 hours. As a general
rule, a shorter lifetime provides more secure
ISAKMP negotiations (up to a point).
However, with shorter lifetimes, the
security appliance sets up future IPSec SAs
more quickly.
Table 27-1
ISAKMP Policy Keywords for CLI Commands (continued)
Command
Keyword
Meaning
Description
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......