Once you are in ISAKMP configuration mode, you can enter your IKE parameters, such as authentication method, encryption algorithm, hash algorithm, and so on: R1 (config-isakmp)# ? Following is a list of ISAKMP commands:
Using the example earlier, the policy we defined for IKE Phase 1 appears in Table 8.3. Table 8.3. IKE Phase 1 Configuration Parameters
An example of an IKE phase 1 policy for R1 would be R1 (config)# crypto isakmp policy 10 R1 (config-isakmp)# authentication pre-share R1 (config-isakmp)# encryption des R1 (config-isakmp)# hash sha-1 R1 (config-isakmp)# group 1 R1 (config-isakmp)# lifetime 43200 |