![]() The VPN solutions include site-to-site VPN, DMVPN, and remote access VPN headend. ![]() The crypto map-based applications include static and dynamic crypto maps, and the tunnel protection-based applications pertain to IPsec static VTI (svti), dynamic VTI (dvti), point-point, and multipoint generic routing encapsulation (mgre) tunnel interfaces. IKEv2 supports crypto map-and tunnel protection-based crypto interfaces. Information About Internet Key Exchange Version 2 IKEv2, a next-generation key management protocol based on RFC 4306, is an enhancement of the IKE protocol. For example, in a security protocol, the capability of the hardware-crypto engine is important, and you cannot specify the Triple Data Encryption Standard (3DES) or Advanced Encryption Standard (AES) types of encryption transform in a nonexportable image, or specify an encryption algorithm that a crypto engine does not support. Restrictions for Configuring Internet Key Exchange Version 2 You cannot configure an option that is not supported on a specific platform. Contents Prerequisites for Configuring Internet Key Exchange Version 2, page 2 Restrictions for Configuring Internet Key Exchange Version 2, page 2 Information About Internet Key Exchange Version 2, page 2 How to Configure Internet Key Exchange Version 2, page 8 Configuration Examples for Internet Key Exchange Version 2, page 28 Where to Go Next, page 50 Additional References, page 51 Feature Information for Internet Key Exchange Version 2, page 53 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA USAĢ Prerequisites for Configuring Internet Key Exchange Version 2 Configuring Internet Key Exchange Version 2 (IKEv2) Prerequisites for Configuring Internet Key Exchange Version 2 You should be familiar with the concepts and tasks explained in the module Configuring Security for VPNs with IPsec. To access Cisco Feature Navigator, go to An account on is not required. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information for Internet Key Exchange Version 2 section on page 53. For the latest feature information and caveats, see the release notes for your platform and software release. Finding Feature Information Your software release may not support all the features documented in this module. IKEv2 is the supporting protocol for IP Security Protocol (IPsec) and is used for performing mutual authentication and establishing and maintaining security associations (SAs). 1 Configuring Internet Key Exchange Version 2 (IKEv2) First Published: MaLast Updated: MaThis module describes the Internet Key Exchange Version 2 (IKEv2) protocol. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |