Cisco 7100 Series Especificaciones Pagina 106

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 112
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 105
Cisco 7100 Series VPN Configuration GuideIndex 2
business partner router 4-30 to 4-31
headquarters router 4-27 to 4-29
intranet
headquarters router 3-37 to 3-39
remote office router 3-40 to 3-41
configuration files
corrupted 1-9
saving changes 1-11
saving to NVRAM 1-11
configuration modes, using 1-9
configuring
authentication methods with IKE policies 3-15
crypto maps 3-26, 4-17
encryption 3-11, 3-19, 4-11
extended access lists 4-24
fair queuing 3-10, 4-22
firewalls 3-32, 4-23
GRE
tunnel destinations 3-6
tunnel interfaces 3-6
tunnel modes 3-6
tunnel sources 3-6
tunnel traffic 3-7
tunnels 3-2, 3-6
IKE policies 3-14
IPSec tunnel mode 4-13
ISM 3-12
NAT 4-4
preshared keys 3-16, 4-10
QoS 3-8, 4-22
console access considerations 2-3
console ports
breaks on 2-5
configuring passwords on 2-4
crypto access lists
commands (table) 4-12
compatibility 3-27, 4-17
creating 3-21, 4-12
extended access lists versus 3-34
verifying 3-21, 4-13
crypto ipsec security-association lifetime
command 3-20
crypto ipsec transform-set command 3-22, 4-13
crypto isakmp enable command 3-14
crypto isakmp identity address command 3-16, 3-17
crypto isakmp key address command 3-17
crypto isakmp key command 3-17, 4-10
crypto map command 3-28, 4-18
crypto map entries
actions of 3-21
changing transform sets 3-22
commands for creating (table) 3-28
compatibility of 3-27
configuring 4-17
creating 3-28, 4-18
defining IPSec processing 4-12
dynamic 3-26
in sets 3-26
purpose 3-26
specifying transform sets in 3-22
transform sets and 3-27
verifying 3-29, 4-19
crypto map local-address command 3-31, 4-21
crypto map s1first command 3-30
crypto map s4second command 4-20
crypto maps
applying 3-30
applying to interfaces 3-31, 4-20
verifying interface associations 3-32, 4-21
customer service and support xiii
D
default commands, using 1-11
denial-of-service attacks, directed broadcasts and 2-6
Diffie-Hellman group identifier, specifying 3-14
directed broadcasts
See broadcasts
DMZ network description 3-34
Vista de pagina 105

Comentarios a estos manuales

Sin comentarios