Cisco ISR 4000 series Configuration Manual page 60

Integrated services routers cc configuration guide
Hide thumbs Also See for ISR 4000 series:
Table of Contents

Advertisement

Service or
Description
Protocol
IKE
Internet Key Exchange
IMAP4S
Internet Message Access
Protocol Secure version 4
IPsec
Internet Protocol Security
(suite of protocols including
IKE, ESP and AH)
Kerberos
A ticket-based
authentication protocol
LDAP
Lightweight Directory
Access Protocol
LDAP-over-
LDAP over Secure Sockets
SSL
Layer
NTP
Network Time Protocol
RADIUS
Remote Authentication Dial
In User Service
SDI (RSA
RSA SecurID
SecureID)
authentication
SMTP
Simple Mail Transfer
Protocol
SNMP
Simple Network
Management Protocol
SSH
Secure Shell
Cisco ISR 4000 Family Routers Administrator Guidance
Client
Allowed
Server
(initiating)
(terminating)
Yes
Yes
Yes
Yes
Over TLS
No
Yes
Yes
Yes
Yes
Over
No
IPsec
Yes
Over
No
IPsec
Yes
Over TLS
No
Yes
Yes
No
Yes
Yes
No
Yes
Over
No
IPsec
Yes
Yes
No
Yes (snmp-
Yes
Yes
trap)
Yes
Yes
Yes
Allowed
Allowed use in the certified configuration
Yes
As described in Section 4.6.1 of this document.
n/a
No restrictions. Protocol is not considered part of the
evaluation.
Yes
Used for securing both traffic that originates from or
terminates at the TOE, as well as for "VPN Gateway"
functionality to secure traffic through the TOE. See
IKE and ESP for usage restrictions.
n/a
If used for authentication of TOE administrators,
tunnel this authentication protocol secure with TLS or
IPsec. Protocol is not considered part of the evaluation.
n/a
Use LDAP-over-SSL instead. Protocol is not
considered part of the evaluation.
n/a
If used for authentication of TOE administrators,
configure LDAP to be tunneled over IPsec. Protocol is
not considered part of the evaluation.
n/a
Any configuration. Use of key-based authentication is
recommended.
n/a
If used for authentication of TOE administrators,
secure through IPsec.
n/a
If used for authentication of TOE administrators,
secure through IPsec. Protocol is not considered part of
the evaluation.
n/a
Recommended to use SMTPS instead. Protocol is not
considered part of the evaluation.
No
Outbound (traps) only. Recommended to tunnel
through IPsec. Protocol is not considered part of the
evaluation.
Yes
As described in the Error! Reference source not f
ound.section of this document.
Page 60 of 66

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isr-4400 series

Table of Contents