Planning for IKE and IPSec

The most important part of any IPSec implementation comes in the planning stage. You should define all parameters and policies on paper. You must know the IPSec gateways, the Phase 1 parameters to use, and the Phase 2 parameters to use, define what is interesting traffic, and define what interfaces IPSec will be applied to.

The goal is to minimize any misconfiguration when you configure actual implementation commands on your router.

A typical security policy would identify items such as those in Table 8.1.

Table 8.1. IPSec Peer Policies
PolicyR1 ConfigurationR2 Configuration
Protected networks30.1.1.0/2430.2.2.0/24
Transport usedTCPTCP
IPSec policyESP-DES, AH-MD5ESP-DES, AH-MD5
IPSec interfaceS0/0S0/0
Peer hostnameR2R1
DH ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.