Solved

How to configure ipsec with manual keys (without isakmp)

Posted on 2004-03-29
2
588 Views
Last Modified: 2012-05-04
I am studying for the Cisco CCSP test and want to know how to configure IPSec with manual keys.  I already have ike keys on the router and I don't know if the router can have both manual and ike keys at one time.

Also, I cannot find an example on Cisco's seb site that tells me what the 0x keys can be (what they may look like.)  I know they have to be the same for the inbound/outbound for both routers but I cannot get it to work.

Can someone give me an example of the four ipsec commands that configure manual keys?

Thanks,
Jerri



0
Comment
Question by:benje02
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Expert Comment

by:billwharton
ID: 10738136
If you sincerely want to pass this exam, you would have to sincerely read this web page on cisco. It explains you in-depth on how to configure IPsec with manual keys. I have read it and followed it and recently passed all my CCSP tests.

http://www.cisco.com/en/US/partner/tech/tk583/tk372/technologies_configuration_example09186a0080093c26.shtml
0
 
LVL 6

Accepted Solution

by:
Pascal666 earned 125 total points
ID: 10738976
The same link, but not requiring partner level CCO access:

http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080093c26.shtml

-Pascal
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question