Enable Policy Lookup; Configure Ipsec Transforms And Protocols - Cisco 520-T1 - Small Business Pro SR Secure Router Software Configuration Manual

Software guide
Table of Contents

Advertisement

Chapter 7
Configuring VPNs Using an IPsec Tunnel and Generic Routing Encapsulation

Enable Policy Lookup

Perform these steps to enable policy lookup through AAA, beginning in global configuration mode:
Command or Action
Step 1
aaa new-model
Example:
Router(config)# aaa new-model
Router(config)#
Step 2
aaa authentication login {default | list-name}
method1 [method2...]
Example:
Router(config)# aaa authentication login
rtr-remote local
Router(config)#
Step 3
aaa authorization {network | exec | commands
level | reverse-access | configuration} {default |
list-name} [method1 [method2...]]
Example:
Router(config)# aaa authorization network
rtr-remote local
Router(config)#
Step 4
username name {nopassword | password
password | password encryption-type
encrypted-password}
Example:
Router(config)# username cisco password 0
cisco
Router(config)#

Configure IPsec Transforms and Protocols

A transform set represents a certain combination of security protocols and algorithms. During IKE
negotiation, the peers agree to use a particular transform set for protecting data flow.
During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at
both peers. When such a transform set is found, it is selected and applied to the protected traffic as a part
of both peers' configurations.
OL-14210-01
Purpose
Enables the AAA access control model.
Specifies AAA authentication of selected users at
login, and specifies the method used.
This example uses a local authentication database.
You could also use a RADIUS server for this. See
the
Cisco IOS Security Configuration Guide
the
Cisco IOS Security Command Reference
details.
Specifies AAA authorization of all
network-related service requests, including PPP,
and the method used to do so.
This example uses a local authorization database.
You could also use a RADIUS server for this. See
the
Cisco IOS Security Configuration Guide
the
Cisco IOS Security Command Reference
details.
Establishes a username-based authentication
system.
This example implements a username of cisco
with an encrypted password of cisco.
Cisco Secure Router 520 Series Software Configuration Guide
Configure a VPN
and
for
and
for
7-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents