Configuring Ip Security - Cisco 1710 Software Configuration Manual

Security router
Hide thumbs Also See for 1710:
Table of Contents

Advertisement

Chapter 2
Cisco 1710 Security Router Configuration
Command
Step 5
protocol pppoe
Step 6
end

Configuring IP Security

Command
Step 1
crypto isakmp policy 10
Step 2
hash algorithm
Step 3
encryption encryption
Step 4
authentication pre-share
Step 5
exit
Step 6
crypto isakmp key name address ip-address Configure a pre-share key and static IP
Step 7
crypto ipsec transform-set name
esp-encryption esp-hash algorithm-hmac
Step 8
crypto mib ipsec flowmib history tunnel
size size
78-12696-01
IP Security (IPSec) is a framework of open standards for ensuring secure private
communications over IP networks. Based on standards developed by the Internet
Engineering Task Force (IETF), IPSec ensures confidentiality, integrity, and
authenticity of data communications across a public IP network. Cisco's
realization of IPSec implements the Data Encryption Standard (DES) and triple
DES (3DES).
Refer to the Cisco IOS Security Configuration Guide, Release 12.1, for more
detailed information on IPSec.
Perform the following tasks to configure IPSec. Start in global configuration
mode.
Task
Specify the tunneling protocol as PPPoE.
Exit router configuration mode.
Task
Define an Internet Key Exchange (IKE)
policy, and assign the policy a priority. This
command places the router in IKE policy
configuration mode.
Specify the hash algorithm for the policy.
Specify the encryption for the policy.
Specify pre-share key as the authentication
method.
Exit IKE policy configuration mode.
address for each VPN client.
Define a combination of security associations
to occur during IPSec negotiations.
Set the size of the tunnel history table.
Cisco 1710 Security Router Software Configuration Guide
Configuring IP Security
2-3

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents