Configure a Router for IKE Using Pre-shared Keys
Step 4 – Verify the IKE configuration

The show crypto isakmp policy command can be used to display configured and default policies. The resultant ISAKMP policy for RouterA is shown in Figure . RouterB’s configuration is identical.


Lab Activity

e-Lab Activity: Configure IKE

In this activity, students will learn how to configure the IKE parameters gathered earlier.

Interactive Media Activity

Demonstration Activity: Configuring IKE

In this activity, students will learn the steps to configure IKE.