Defining IKE Phase 2 (IPSec) Policy

Once you have your IKE Phase 1 policy defined, you next identify your IKE Phase 2 (IPSec) policy. Again you first need to write down exactly what the policy should look like, as in Table 8.4.

Table 8.4. IKE Phase 2 Configuration Parameters
PolicyR1 ConfigurationR2 Configuration
Protected networks30.1.1.0/2430.2.2.0/24
Transport usedTCPTCP
IPSec policyESP-DES, AH-MD5ESP-DES, AH-MD5
IPSec interfaceS0/0S0/0
Peer hostnameR2R1
D-H authenticationPresharedPreshared

Example of IKE Phase 2 (IPSec) Policy

The IKE phase 2 policy that would be implemented to achieve the preceding security policy for R1 would look like:

 R1 (config)# access-list 122 permit tcp 30.1.1.0 0.0.0.255 30.2.2.0 0.0.0.255 R1 (config)# crypto ipsec transform-set ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.