Contents
5
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Configure Group Policy Information 5
Apply Mode Configuration to the Crypto Map 6
Enable Policy Lookup 6
Configure IPSec Transforms and Protocols 7
Configure the IPSec Crypto Method and Parameters 8
Apply the Crypto Map to the Physical Interface 9
Create an Easy VPN Remote Configuration 10
Verifying Your Easy VPN Configuration 11
Configuration Example 11
CHAPTER
7 Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation 1
Configure a VPN 2
Configure the IKE Policy 3
Configure Group Policy Information 4
Enable Policy Lookup 5
Configure IPSec Transforms and Protocols 5
Configure the IPSec Crypto Method and Parameters 6
Apply the Crypto Map to the Physical Interface 7
Configure a GRE Tunnel 8
Configuration Example 9
CHAPTER
8 Configuring a Simple Firewall 1
Configure Access Lists 3
Configure Inspection Rules 3
Apply Access Lists and Inspection Rules to Interfaces 4
Configuration Example 5
CHAPTER
9 Configuring a Wireless LAN Connection 1
Configure the Root Radio Station 2
Configure Bridging on VLANs 4
Configure Radio Station Subinterfaces 6
Configuration Example 7
CHAPTER
10 Sample Configuration 1
PART
3 Configuring Additional Features and Troubleshooting