EasyManua.ls Logo

Cisco IOS XR

Cisco IOS XR
254 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
How to Implement IKE Security Protocol Configurations for IPSec Networks
SC-37
Cisco IOS XR System Security Configuration Guide
11. max-logins number-of-logins
12. max-users number-of-users
13. netmask mask
14. pfs
15. pool name
16. save-password
17. split-dns domain-name
18. wins primary-server [secondary-server]
19. end
or
commit
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 2
crypto isakmp client configuration group
group-name
Example:
RP/0/RP0/CPU0:router(config)# crypto isakmp
client configuration group cisco
Specifies which group's policy profile is defined and enters
ISAKMP group configuration mode.
If no specific group matches and a default group is
defined, users are automatically given the default
group's policy.
Step 3
key
preshared-key
Example:
RP/0/RP0/CPU0:router(config-group)# key
samplekey
Specifies the IKE preshared key for group policy attribute
definition.
Note This command must be enabled if the client
identifies itself with a preshared key.
Step 4
acl
acl-name
Example:
RP/0/RP0/CPU0:router(config-group)# acl group1
(Optional) Configures split tunneling.
Use the acl-name argument to specify a group of ACL
rules that represent protected subnets for split tunneling
purposes.
Step 5
backup-server {ip-address | hostname}
Example:
RP/0/RP0/CPU0:router(config-group)#
backup-server 10.1.1.1
Specifies the backup server.
Use the ip-address argument to specify the IP address
of the server.
Use the hostname argument to specify the hostname of
the server.

Table of Contents

Related product manuals