4-4
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
OL-5979-03
Chapter 4 Configuring the SA-VAM2+
Configuration Tasks
For detailed information on creating IKE policies, refer to the “Configuring Internet Key Exchange
Security Protocol” chapter in the
Security Configuration Guide
publication.
Configuring a Transform Set
See the
Advanced Encryption Standard (AES)
feature module for more information on configuring a
transform set.
This section includes the following topics:
•
Defining a Transform Set
•
IPSec Protocols: AH and ESP
•
Selecting Appropriate Transforms
•
The Crypto Transform Configuration Mode
•
Changing Existing Transforms
•
Transform Example
A transform set is an acceptable combination of security protocols, algorithms, and other settings to
apply to IPSec protected traffic. During the IPSec security association (SA) negotiation, the peers agree
to use a particular transform set when protecting a particular data flow.
Step 4
Router(config-isakmp)#
lifetime
seconds
(Optional) Specifies the lifetime of an IKE security association
(SA).
seconds
—Number of seconds that each SA should exist before
expiring. Use an integer from 60 to 86,400 seconds.
Note
If this command is not enabled, the default value (86,400
seconds [one day]) will be used.
Step 5
Router(config-isakmp)#
hash
{
sha
|
md5
}
(Optional) Specifies the hash algorithm within an IKE policy.
•
sha
—Specifies SHA-1 (HMAC variant) as the hash
algorithm.
•
md5
—Specifies MD5 (HMAC variant) as the hash
algorithm.
Note
If this command is not enabled, the default value (
sha
)
will be used.
Step 6
Router(config-isakmp)#
group
{
1
|
2
|
5
}
(Optional) Specifies the Diffie-Hellman (DH) group identifier
within an IKE policy.
1
—Specifies the 768-bit DH group.
2
—Specifies the 1024-bit DH group.
5
—Specifies the 1536-bit DH group.
Note
If this command is not enabled, the default value (768-bit)
will be used.
Command
Purpose