EasyManuals Logo

Cisco CISCO851-K9 - 851 Integrated Services Router User Manual

Cisco CISCO851-K9 - 851 Integrated Services Router
196 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #83 background imageLoading...
Page #83 background image
7-5
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 7 Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation
Configure a VPN
Enable Policy Lookup
Perform these steps to enable policy lookup through AAA, beginning in global configuration mode:
Command or Action Purpose
Step 1
aaa new-model
Example:
Router(config)# aaa new-model
Router(config)#
Enables the AAA access control model.
Step 2
aaa authentication login {default | list-name}
method1 [method2...]
Example:
Router(config)# aaa authentication login
rtr-remote local
Router(config)#
Specifies AAA authentication of selected users at
login, and specifies the method used.
This example uses a local authentication database.
You could also use a RADIUS server for this. See
the
Cisco IOS Security Configuration Guide and
the Cisco IOS Security Command Reference for
details.
Step 3
aaa authorization {network | exec | commands
level | reverse-access | configuration} {default |
list-name} [method1 [method2...]]
Example:
Router(config)# aaa authorization network
rtr-remote local
Router(config)#
Specifies AAA authorization of all
network-related service requests, including PPP,
and the method used to do so.
This example uses a local authorization database.
You could also use a RADIUS server for this. See
the
Cisco IOS Security Configuration Guide and
the Cisco IOS Security Command Reference for
details.
Step 4
username name {nopassword | password
password | password encryption-type
encrypted-password}
Example:
Router(config)# username cisco password 0
cisco
Router(config)#
Establishes a username-based authentication
system.
This example implements a username of cisco
with an encrypted password of cisco.
Configure IPSec Transforms and Protocols
A transform set represents a certain combination of security protocols and algorithms. During IKE
negotiation, the peers agree to use a particular transform set for protecting data flow.
During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at
both peers. When such a transform set is found, it is selected and applied to the protected traffic as a part
of both peers’ configurations.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco CISCO851-K9 - 851 Integrated Services Router and is the answer not in the manual?

Cisco CISCO851-K9 - 851 Integrated Services Router Specifications

General IconGeneral
BrandCisco
ModelCISCO851-K9 - 851 Integrated Services Router
CategoryNetwork Router
LanguageEnglish

Related product manuals