
Cisco 7100 Series VPN Configuration GuideIndex 4
I
ICMP Host Unreachable message 3-36, 4-26
IKE
description 3-12
keys
See keys, preshared 3-16, 4-10
policies
configuration, required 3-15
configuring 3-14
default values (note) 3-13
defaults, viewing 3-7
enabling by default 3-13
identifying 3-14
requirements 3-15
requirements, RSA signatures method 3-15
troubleshooting 3-18
verifying 3-18
viewing 3-18
SAs and 4-17
UDP port 3-19, 4-12
inside global address 4-5
inside local address 4-5
inside network 4-4
Integrated Service Module
See ISM
interface configuration mode, summary 1-10
interface fastethernet command 4-7
interface serial command 3-10, 3-30
interface tunnel command 3-6, 3-30
interfaces
applying crypto maps 3-30, 4-20
applying crypto maps to multiple 3-31, 4-21
applying IP access lists 3-36
loopback 3-31, 4-21
verifying crypto map associations 4-21
Internet Key Exchange
See IKE
Internet Security Association & Key Management
Protocol
See ISAKMP identities
intranet VPN scenario
configuring 3-6
description 2-2, 3-2
figure 3-2
physical elements 3-2
physical elements (figure) 3-3
physical elements (table) 3-4
IP access lists
applying to interface 3-36, 4-25
for security 2-3
inbound or outbound 3-36, 4-25
software checking of 3-36
undefined 3-36, 4-26
See also extended access lists 3-35
ip access-group command 3-36, 4-25
ip access-list extended command 4-12
IP addresses
NAT definitions 4-5
nonregistered 4-4
protecting internal 2-6
renumbering 4-4
static translation 4-5
IP datagrams
in IPSec transport mode 3-24
in IPSec tunnel mode 3-24, 4-15
ip nat inside command 4-7
ip nat inside source command 4-7
ip nat outside command 4-7
ip route command 3-7
IP tunneling concepts and terminology (figure) 3-5
IP unicast frames, IPSec and 3-5
IPSec
configuring 3-19, 4-11
description 3-12
proxies 3-24, 4-15
SAs
clearing 4-20
IKE negotiations 3-27
See also SAs
special considerations 2-4
Comentarios a estos manuales