EasyManuals Logo

Cisco ASR 1004 User Manual

Cisco ASR 1004
72 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #34 background imageLoading...
Page #34 background image
Page 34 of 72
Note: the authorized administrator must ensure that the keysize for this setting is
greater than or equal to the keysize selected for ESP in Section 4.6.2 below. If
AES 128 is selected here, then the highest keysize that can be selected on the TOE
for ESP is AES 128 (either CBC or GCM).
Note: Both confidentiality and integrity are configured with the hash sha and
encryption aes commands respectively. As a result, confidentiality-only mode is
disabled.
TOE-common-criteria (config-ikev2-proposal)# group 14
This selects DH Group 14 (2048-bit MODP) for IKE, but 19 (256-bit Random
ECP), 24 (2048-bit MODP with 256-bit POS), 20 (384-bit Random ECP), 15
(3072 bit MODP), and 16 (4096-bit MODP) are also allowed and supported.
TOE-common-criteria (config)#crypto ikev2 keyring keyring-1
TOE-common-criteria (config-ikev2-keyring)# peer peer1
TOE-common-criteria (config-ikev2-keyring-peer)# address 0.0.0.0 0.0.0.0
TOE-common-criteria (config-ikev2-keyring-peer)# pre-shared-key
cisco123!cisco123!CISC
This section creates a keyring to hold the pre-shared keys referenced in the steps
above. In IKEv2 these pre-shared keys are specific to the peer.
Note: Pre-shared keys on the TOE must be at least 22 characters in length and
can be composed of any combination of upper and lower case letters, numbers,
and special characters (that include: “!”, “@”, “#”, “$”, “%”, “^”, “&, “*”,
“(“, and “)”).
The TOE supports pre-shared keys up to 128 bytes in length. While longer keys
increase the difficulty of brute-force attacks, longer keys increase processing
time.
HEX keys generated off system can also be input for IKEv2 using the following
instead of the pre-shared-key command above: ‘pre-shared-key hex [hex key]’.
For example: pre-shared-key hex 0x6A6B6C.
This configures IPsec to use pre-shared keys. X.509 v3 certificates are also
supported for authentication of IPsec peers. See Section 4.6.3 below for
additional information.
TOE-common-criteria (config)#crypto logging ikev2
This setting enables IKEv2 syslog messages.
Note: The configuration above is not a complete IKE v2 configuration, and that additional
settings will be needed. See [18] Configuring Internet Key Exchange Version 2 (IKEv2) for
additional information on IKE v2 configuration.

Table of Contents

Other manuals for Cisco ASR 1004

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASR 1004 and is the answer not in the manual?

Cisco ASR 1004 Specifications

General IconGeneral
Product TypeRouter
Form FactorRack-mountable
Rack Height2U
Forwarding CapacityUp to 20 Gbps
Total Number of PortsVaries by configuration
Number of Total Expansion Slots4
Product SeriesASR 1000
ModelASR 1004
Forwarding PerformanceUp to 20 Gbps
Operating SystemCisco IOS XE
Power SupplyDual
Route ProcessorASR 1000 Series Route Processor
Network Interface ModulesSFP, SFP+, Gigabit Ethernet, 10 Gigabit Ethernet
Interfaces/PortsVaries by configuration
Expansion Slot TypeSPA
Throughput20 Gbps
RedundancyPower supply, Route Processor
InterfacesGigabit Ethernet, 10 Gigabit Ethernet, SFP, SFP+
StorageUp to 64 GB Flash

Related product manuals