
CHAPTER
23-1
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
23
Configuring IPSec and ISAKMP
This chapter describes how to configure the IPSec and ISAKMP standards to build virtual private
networks. It includes the following sections:
• Tunneling Overview, page 23-1
• IPSec Overview, page 23-2
• Configuring ISAKMP, page 23-2
• Configuring Certificate Group Matching, page 23-9
• Configuring IPSec, page 23-11
• Clearing Security Associations, page 23-20
• Clearing Crypto Map Configurations, page 23-21
Tunneling Overview
Tunneling is the heart of virtual private networks. Tunnels make it possible to use a public TCP/IP
network, such as the Internet, to create secure connections between remote users and a private corporate
network.
The secure connection is called a tunnel. The security appliance uses the ISAKMP and IPSec tunneling
standards to build and manage tunnels. ISAKMP and IPSec accomplish the following:
• Negotiate tunnel parameters
• Establish tunnels
• Authenticate users and data
• Manage security keys
• Encrypt and decrypt data
• Manage data transfer across the tunnel
• Manage data transfer inbound and outbound as a tunnel endpoint or router
The security appliance functions as a bidirectional tunnel endpoint. It can receive plain packets from the
private network, encapsulate them, create a tunnel, and send them to the other end of the tunnel where
they are unencapsulated and sent to their final destination. It can also receive encapsulated packets from
the public network, unencapsulate them, and send them to their final destination on the private network.
Komentarze do niniejszej Instrukcji