Routing Protocols; Macsec And Mka Configuration - Cisco ISR 4000 series Configuration Manual

Integrated services routers cc configuration guide
Hide thumbs Also See for ISR 4000 series:
Table of Contents

Advertisement

Cisco ISR 4000 Family Routers Administrator Guidance
Note: Logging of all traffic hitting the default deny acl can generate a large number of logs, and
a determination should be made whether it is necessary prior to entering this at the end of all
access lists.
To apply the acls to the interfaces:
TOE-common-criteria(config)# interface GigabitEthernet0/0
TOE-common-criteria(config-if)# ip access-group 199 in
TOE-common-criteria(config)# interface GigabitEthernet0/1
TOE-common-criteria(config-if)# ip access-group 100 in
Additional information on creation of packet filtering and VPN information flow policies is given
in Section 4.6.4 below.

3.3.7 Routing Protocols

The routing protocols are used to maintain routing tables. The routing tables can also be
configured and maintained manually. Refer to the applicable sections in [3] Configuration
Fundamentals for configuration of the routing protocols.

3.3.8 MACSEC and MKA Configuration

The detailed steps to configure MKA, configure MACsec and MKA on interfaces are listed in
[17] -
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/macsec/configuration/xe-16/macsec-xe-
16-book/wan-macsec-mka-support-enhance.html#d74e990a1635
Note: For 256-bit encryption, the key-string length will be 64-characters. For 128-bit encryption,
the key-string length will be 32 characters.
Page 25 of 66

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isr-4400 series

Table of Contents