<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring isakmp policy in Cisco PIX firewall. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276364#M562875</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first thanks for communication.&lt;/P&gt;&lt;P&gt;After you put in CLI on PIX command&lt;/P&gt;&lt;P&gt;sh isakmp policy you can see policies you configured&lt;/P&gt;&lt;P&gt;(I mean me) an at the end is default policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default protection suite&lt;/P&gt;&lt;P&gt;        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).&lt;/P&gt;&lt;P&gt;        hash algorithm:         Secure Hash Standard&lt;/P&gt;&lt;P&gt;        authentication method:  Rivest-Shamir-Adleman Signature&lt;/P&gt;&lt;P&gt;        Diffie-Hellman group:   #1 (768 bit)&lt;/P&gt;&lt;P&gt;        lifetime:               86400 seconds, no volume limit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is for which reason is there.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rg&lt;/P&gt;&lt;P&gt;jl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Aug 2004 14:15:29 GMT</pubDate>
    <dc:creator>johnleeee</dc:creator>
    <dc:date>2004-08-23T14:15:29Z</dc:date>
    <item>
      <title>Configuring isakmp policy in Cisco PIX firewall.</title>
      <link>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276362#M562873</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need help with configuring isakmp policy on PIX&lt;/P&gt;&lt;P&gt;to set up VPN connection from another PIX.&lt;/P&gt;&lt;P&gt;What is true? When I configure same policy in both PIXs (PIX to PIX)they establish VPN connection. Thats true.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I connfigure different policy in both, they dont establish VPN connection.&lt;/P&gt;&lt;P&gt;Thats true again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And on PIX is default isakmp policy preconfigured.&lt;/P&gt;&lt;P&gt;Will this policy play role in setting VPN connection up when configured didnt.&lt;/P&gt;&lt;P&gt;I ask this question because on each PIX isakmp policy is same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;jl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276362#M562873</guid>
      <dc:creator>johnleeee</dc:creator>
      <dc:date>2020-02-21T07:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring isakmp policy in Cisco PIX firewall.</title>
      <link>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276363#M562874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JL, each PIX can have multiple ISAKMP policies but there must be at least one match on both sides.  By design, if there are multiple matching policies then they should agree on the "best" one which will ususally be the most secure.  If they don't have at least one matching policy then the tunnel will not be established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never seen a default policy defined on a PIX but who knows with future code and/or models.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2004 12:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276363#M562874</guid>
      <dc:creator>rguyler</dc:creator>
      <dc:date>2004-08-23T12:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring isakmp policy in Cisco PIX firewall.</title>
      <link>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276364#M562875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first thanks for communication.&lt;/P&gt;&lt;P&gt;After you put in CLI on PIX command&lt;/P&gt;&lt;P&gt;sh isakmp policy you can see policies you configured&lt;/P&gt;&lt;P&gt;(I mean me) an at the end is default policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default protection suite&lt;/P&gt;&lt;P&gt;        encryption algorithm:   DES - Data Encryption Standard (56 bit keys).&lt;/P&gt;&lt;P&gt;        hash algorithm:         Secure Hash Standard&lt;/P&gt;&lt;P&gt;        authentication method:  Rivest-Shamir-Adleman Signature&lt;/P&gt;&lt;P&gt;        Diffie-Hellman group:   #1 (768 bit)&lt;/P&gt;&lt;P&gt;        lifetime:               86400 seconds, no volume limit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is for which reason is there.?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rg&lt;/P&gt;&lt;P&gt;jl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Aug 2004 14:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-isakmp-policy-in-cisco-pix-firewall/m-p/276364#M562875</guid>
      <dc:creator>johnleeee</dc:creator>
      <dc:date>2004-08-23T14:15:29Z</dc:date>
    </item>
  </channel>
</rss>

