EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #394 background imageLoading...
Page #394 background image
21-10
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 21 Configuring OSPF
Customizing OSPF
This area includes the settings for entering the password when password authentication is enabled. The
following fields are editable:
Enter Password—Enter a text string of up to eight characters.
Re-enter Password—Reenter the password.
Step 6 Choose the settings for MD5 IDs and Keys in the ID area.
This area includes the settings for entering the MD5 keys and parameters when MD5 authentication is
enabled. All devices on the interface using OSPF authentication must use the same MD5 key and ID.
Options and fields include:
Key ID—Enter a numerical key identifier. Valid values range from 1 to 255. This field also displays
the Key ID for the interface selected.
Key—An alphanumeric character string of up to 16 bytes. This field also displays the Key ID for the
interface selected.
Click the Add or Delete button to add or delete the specified MD5 key to the MD5 ID and Key table.
Step 7 Click OK.
Step 8 Click the Properties tab.
Step 9 Choose the interface that you want to edit. Double-clicking a row in the table opens the Properties tab
dialog box for the selected interface.
Step 10 Click Edit.
The Interface text field displays the name of the interface for which you are configuring OSPF
properties. You cannot edit this field.
Step 11 Check or uncheck the Broadcast check box to specify that the interface is a broadcast interface.
By default, this check box is selected for Ethernet interfaces. Uncheck this check box to designate the
interface as a point-to-point, non-broadcast interface. Specifying an interface as point-to-point,
non-broadcast lets you transmit OSPF routes over VPN tunnels.
When an interface is configured as point-to-point, non-broadcast, the following restrictions apply:
You can define only one neighbor for the interface.
You need to manually configure the neighbor. (See the “Defining Static OSPF Neighbors” section
on page 21-14.)
You need to define a static route pointing to the crypto endpoint. (See the “Configuring Static and
Default Routes” section on page 19-2.)
If OSPF over the tunnel is running on the interface, regular OSPF with an upstream router cannot
be run on the same interface.
You should bind the crypto-map to the interface before specifying the OSPF neighbor to ensure that
the OSPF updates are passed through the VPN tunnel. If you bind the crypto-map to the interface
after specifying the OSPF neighbor, use the clear local-host all command to clear OSPF
connections so the OSPF adjacencies can be established over the VPN tunnel.
Step 12 Configure the following options:
Enter a value in the Cost field which determines the cost of sending a packet through the interface.
The default value is 10.
In the Priority field, enter the OSPF router priority value.
When two routers connect to a network, both attempt to become the designated router. The devices
with the higher router priority becomes the designated router. If there is a tie, the router with the
higher router ID becomes the designated router.

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals