User Tools

Site Tools


cisco_l2l_ipsec_-_new

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
cisco_l2l_ipsec_-_new [2024/07/14 21:37] – old revision restored (2024/07/14 13:04) 52.230.152.101cisco_l2l_ipsec_-_new [2024/07/14 23:57] (current) – old revision restored (2024/07/14 17:34) 52.230.152.95
Line 2: Line 2:
 For manamgement purposes - negotiation of new keys, health status, variables\\ For manamgement purposes - negotiation of new keys, health status, variables\\
 This is the management channel, and the first thing that gets created - the policy set, nothing but negotiation of param (how to secure, how to auth, encypt algo, key-lifetime).\\ This is the management channel, and the first thing that gets created - the policy set, nothing but negotiation of param (how to secure, how to auth, encypt algo, key-lifetime).\\
-This is an agreement of how to do crypto. If the param are OK on both sides, we have achevied Phase 1\\+This is an agreement of how to do crypto.  
 +If the policy param are OK on both sides, we have achevied Phase 1, if not the policy param needs to be checked out\\ 
  
 show crypto isakmp sa\\ show crypto isakmp sa\\
Line 9: Line 11:
 The goal is to create IPSEC SA\\ The goal is to create IPSEC SA\\
 The transform set - how to secure the end user data. When the transform set param are the same on both ends, we will then have 2 IPSEC SA (inbound and outbound)\\ The transform set - how to secure the end user data. When the transform set param are the same on both ends, we will then have 2 IPSEC SA (inbound and outbound)\\
 +If IPSEC is down, transform set needs to be checked.\\
  
 When Phase 1 and Phase 2 are completed we will then have 3 SA:\\ When Phase 1 and Phase 2 are completed we will then have 3 SA:\\
cisco_l2l_ipsec_-_new.txt · Last modified: 2024/07/14 23:57 by 52.230.152.95