Cisco 1812W - Integrated Services Router Wireless Configuration Manual page 92

1800 series integrated services routers
Hide thumbs Also See for 1812W - Integrated Services Router Wireless:
Table of Contents

Advertisement

Configure a VPN
Command or Action
Step 3
aaa authorization {network | exec | commands
level | reverse-access | configuration} {default |
list-name} [method1 [method2...]]
Example:
Router(config)# aaa authorization network
rtr-remote local
Router(config)#
Step 4
username name {nopassword | password
password | password encryption-type
encrypted-password}
Example:
Router(config)# username Cisco password 0
Cisco
Router(config)#
Configure IPSec Transforms and Protocols
A transform set represents a certain combination of security protocols and algorithms. During IKE
negotiation, the peers agree to use a particular transform set for protecting data flow.
During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at
both peers. When such a transform set is found, it is selected and applied to the protected traffic as a part
of both peers' configurations.
Perform these steps to specify the IPSec transform set and protocols, beginning in global configuration
mode:
Command or Action
Step 1
crypto ipsec transform-set transform-set-name
transform1 [transform2] [transform3]
[transform4]
Example:
Router(config)# crypto ipsec transform-set
vpn1 esp-3des esp-sha-hmac
Router(config)#
Step 2
crypto ipsec security-association lifetime
{seconds seconds | kilobytes kilobytes}
Example:
Router(config)# crypto ipsec
security-association lifetime seconds 86400
Router(config)#
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
7-6
Chapter 7
Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation
Purpose
Specifies AAA authorization of all
network-related service requests, including PPP,
and the method used to do so.
This example uses a local authorization database.
You could also use a RADIUS server for this. See
the
Cisco IOS Security Configuration Guide
the
Cisco IOS Security Command Reference
details.
Establishes a username-based authentication
system.
This example implements a username of Cisco
with an encrypted password of Cisco.
Purpose
Defines a transform set—An acceptable
combination of IPSec security protocols and
algorithms.
See the
for detail about the valid transforms and
combinations.
Specifies global lifetime values used when
negotiating IPSec security associations.
See the
for details.
Cisco IOS Security Command Reference
Cisco IOS Security Command Reference
and
for
OL-6426-02

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents