Enable Policy Lookup; Configure Ipsec Transforms And Protocols - Cisco 520-T1 - Small Business Pro SR Secure Router Software Configuration Manual

Software guide
Table of Contents

Advertisement

Enable Policy Lookup

Enable Policy Lookup
Perform these steps to enable policy lookup through AAA, beginning in global configuration mode:
Command or Action
Step 1
aaa new-model
Example:
Router(config)# aaa new-model
Router(config)#
Step 2
aaa authentication login {default | list-name}
method1 [method2...]
Example:
Router(config)# aaa authentication login
rtr-remote local
Router(config)#
Step 3
aaa authorization {network | exec | commands
level | reverse-access | configuration} {default |
list-name} [method1 [method2...]]
Example:
Router(config)# aaa authorization network
rtr-remote local
Router(config)#
Step 4
username name {nopassword | password
password | password encryption-type
encrypted-password}
Example:
Router(config)# username Cisco password 0
Cisco
Router(config)#

Configure IPsec Transforms and Protocols

A transform set represents a certain combination of security protocols and algorithms. During IKE
negotiation, the peers agree to use a particular transform set for protecting data flow.
During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at
both peers. When such a transform set is found, it is selected and applied to the protected traffic as a part
of both peers' configurations.
Cisco Secure Router 520 Series Software Configuration Guide
6-6
Chapter 6
Configuring a VPN Using Easy VPN and an IPsec Tunnel
Purpose
Enables the AAA access control model.
Specifies AAA authentication of selected users at
login, and specifies the method used.
This example uses a local authentication database.
You could also use a RADIUS server for this. For
details, see the
Cisco IOS Security Configuration
Guide
and
Cisco IOS Security Command
Reference.
Specifies AAA authorization of all
network-related service requests, including PPP,
and specifies the method of authorization.
This example uses a local authorization database.
You could also use a RADIUS server for this. For
details, see the
Cisco IOS Security Configuration
Guide
and
Cisco IOS Security Command
Reference.
Establishes a username-based authentication
system.
This example implements a username of Cisco
with an encrypted password of Cisco.
OL-14210-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents