Cisco 7100 Series Especificaciones Pagina 81

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 112
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 80
Extranet VPN Business Scenario 4-9
Step 2—Configuring Encryption and an IPSec Tunnel
Step 2—Configuring Encryption and an IPSec Tunnel
For the ISM in slot 5 of Cisco 7100 series routers to provide encryption and IPSec
tunneling services, you must complete the following steps:
1 Configuring a Different Shared Key
Note The headquarters router and business partner router configured in this chapter use
the same Internet Key Exchange (IKE) policy and priority number—policy 1— that was
configured in the “Configuring IKE Policies” section on page 3-13, but with a different
shared key. Only a different key for policy 1 is configured in this chapter. See the
“Configuring IKE Policies” section on page 3-13 for instructions on how to configure IKE
policies. If you choose to configure additional IKE policies, we recommend using a unique
hash algorithm and authentication method for each additional IKE policy.
2 Configuring IPSec and IPSec Tunnel Mode (Creating access lists and transform sets,
and configuring IPSec in tunnel mode)
3 Configuring Crypto Maps (Creating crypto maps and assigning maps to interfaces)
Optionally, you can configure Certification Authority (CA) interoperability. This guide
does not explain how to configure CA interoperability on your Cisco 7100 series router.
Refer to the “IP Security and Encryption” part of the Security Configuration Guide and the
Security Command Reference publications for detailed information on configuring CA
interoperabilty.
Note This section only contains basic configuration information for enabling
encryption and IPSec tunneling services. For overview information on the ISM and
configuring IKE policies, IPSec, and crypto maps, see the “Step 3—Configuring
Encryption” section on page 3-11. Refer to the “IP Security and Encryption” part of the
Security Configuration Guide and the Security Command Reference publications for
detailed configuration information on IPSec, IKE, and CA.
Refer to the Integrated Service Adapter and Integrated Service Module Installation and
Configuration publication for detailed configuration information on the ISM.
Vista de pagina 80
1 2 ... 76 77 78 79 80 81 82 83 84 85 86 ... 111 112

Comentarios a estos manuales

Sin comentarios