Cisco WS-X4604-GWY - VoIP Gateway Especificaciones Pagina 118

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 166
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 117
7-4
Cisco Catalyst 4000 Access Gateway Module Installation and Configuration Note
OL-3008-01
Chapter 7 Configuring Encryption Services
Configuring the Encryption Service Adapter
encryption and authentication keys to be used by IPSec. IPSec can be used to protect one or more data
flows between a pair of hosts, between a pair of security gateways, or between a security gateway and a
host.
To configure IPSec network security, follow this procedure:
Command Purpose
Step 1
gateway(config)# crypto ipsec
security-association lifetime
seconds seconds kilobytes kilobytes
Specifies the lifetime of a security association
1
.
As a general rule, the shorter the lifetime (up to a point),
the more secure your IKE negotiations will be. However,
with longer lifetimes, future IPSec security associations
can be set up more quickly.
The default lifetimes are 3600 seconds (one hour) and
4608000 kilobytes (10 megabytes per second for one
hour).
Step 2
gateway(config)# crypto ipsec
transform-set transform_set_name
transform1 [transform2 [transform3]]
Specifies a transform set
2
and enter transform-set
configuration mode.
To define a transform set, specify one to three
"transforms"---each transform represents an IPSec
security protocol (ESP or AH) plus the algorithm you want
to use. When the particular transform set is used during
negotiations for IPSec security associations, the entire
transform set (the combination of protocols, algorithms
and other settings) must match a transform set at the
remote peer.
Step 3
gateway(cfg-crypto-trans)# exit
Returns to global configuration mode.
Step 4
gateway(config)# crypto map map_name
seq_num ipsec-isakmp [dynamic
dynamic_map_name] [discover]
Creates a crypto map
3
denoted by map-name. Enter crypto
map configuration mode, unless you use the dynamic
keyword.
seq-num is the number you assign to the crypto map entry.
ipsec-isakmp indicates that IKE will be used to establish
the IPSec security associations for protecting the traffic
specified by this crypto map entry.
dynamic is an optional argument specifying that this
crypto map entry references a preexisting dynamic crypto
map. Dynamic crypto maps are policy templates used in
processing negotiation requests from a peer IPSec device.
If you use this keyword, none of the crypto map
configuration commands will be available.
dynamic-map-name specifies the name of the dynamic
crypto map set that should be used as the policy template.
Step 5
gateway(config-crypto map)# set peer
hostname|ip_address
Specifies the same remote IPSec peer that you specified in
Step 4 in the previous procedure, Configure the Internet
Key Exchange Security Protocol, page 7-3.
Step 6
gateway(config-crypto map)# set
transform-set transform_set_name
For this crypto map entry, specify the same transform set
that you specified in Step 2 of this procedure.
Vista de pagina 117
1 2 ... 113 114 115 116 117 118 119 120 121 122 123 ... 165 166

Comentarios a estos manuales

Sin comentarios