EasyManua.ls Logo

Cisco IOS XR User Manual

Cisco IOS XR
254 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #81 background imageLoading...
Page #81 background image
Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
Configuration Examples for Implementing IKE Security Protocol
SC-69
Cisco IOS XR System Security Configuration Guide
Creating IKE Policies: Example
This example shows how to create two IKE policies with policy 15 as the highest priority, policy 20 as
the next priority, and the existing default priority as the lowest priority.
crypto isakmp policy 15
encryption 3des
hash md5
authentication rsa-sig
group 2
lifetime 5000
crypto isakmp policy 20
authentication pre-share
lifetime 10000
In the example, the encryption des of policy 15 would not appear in the written configuration because
this is the default value for the encryption algorithm parameter.
If the show crypto isakmp policy command is issued with this configuration, the output is as follows:
Protection suite priority 15
encryption algorithm:DES - Data Encryption Standard (56 bit keys)
hash algorithm:Message Digest 5
authentication method:Rivest-Shamir-Adelman Signature
Diffie-Hellman group:#2 (1024 bit)
lifetime:5000 seconds, no volume limit
Protection suite priority 20
encryption algorithm:DES - Data Encryption Standard (56 bit keys)
hash algorithm:Secure Hash Standard
authentication method:preshared Key
Diffie-Hellman group:#1 (768 bit)
lifetime:10000 seconds, no volume limit
Default protection suite
encryption algorithm:DES - Data Encryption Standard (56 bit keys)
hash algorithm:Secure Hash Standard
authentication method:Rivest-Shamir-Adelman Signature
Diffie-Hellman group:#1 (768 bit)
lifetime:86400 seconds, no volume limit
Note Although the output shows “no volume limit” for the lifetimes, you can configure only a time lifetime
(such as 86,400 seconds); volume-limit lifetimes are not configurable.
Configuring a service-ipsec Interface with a Dynamic Profile: Example
The following shows how to configure a service-ipsec interface with a dynamic profile:
ipv4 access-list acl1
10 permit ipv4 any any
!
interface service-ipsec1
ipv4 address 44.44.44.44 255.255.255.0
profile ipsec-profile1
tunnel source 100.0.0.1
service-location preferred-active 0/4/0
!
crypto isakmp
crypto isakmp policy 10
authentication pre-share

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco IOS XR and is the answer not in the manual?

Cisco IOS XR Specifications

General IconGeneral
Operating SystemCisco IOS XR
ArchitectureMicrokernel
High AvailabilityYes
TypeNetwork operating system
Developed byCisco Systems
LicenseProprietary
Programming LanguageC, C++
KernelQNX
Supported PlatformsCisco ASR9000, NCS series
Security FeaturesRole-Based Access Control (RBAC), Secure Boot, Encryption
Management InterfaceCLI, SNMP, NETCONF, RESTCONF
Release Date2004
Target DevicesHigh-end core routers, service provider edge routers, data center interconnect (DCI) routers
Supported HardwareCisco routers and switches
Networking ProtocolsBGP, OSPF, IS-IS, MPLS
Virtualization SupportVirtualization-ready, supports network function virtualization (NFV) and containerization technologies.

Summary

Implementing Certification Authority Interoperability on Cisco IOS XR Software

Prerequisites for Implementing Certification Authority

Lists necessary prerequisites for configuring CA interoperability.

Information About Implementing Certification Authority

Explains CA concepts, standards (IPSec, IKE, PKCS), and authorities.

How to Implement CA Interoperability

Provides step-by-step procedures for CA interoperability configuration.

Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software

Prerequisites

Lists necessary prerequisites for configuring IKE security protocol.

Information About Implementing IKE Security Protocol Configurations for IPSec Networks

Explains IKE concepts, standards (IKE, IPSec, ISAKMP, Oakley, Skeme), and algorithms.

IKE Policies

Details IKE policy creation, parameter definitions, and peer agreement for negotiation.

Implementing Keychain Management on Cisco IOS XR Software

Restrictions for Implementing Keychain Management

Notes the impact of system clock changes on key validity.

How to Implement Keychain Management

Covers procedures for configuring keychains, key identifiers, and key strings.

Implementing IPSec Network Security on Cisco IOS XR Software

Prerequisites for Implementing IPSec Network Security

Lists necessary prerequisites for configuring IPSec network security.

Information About Implementing IPSec Networks

Explains IPSec concepts like crypto profiles, access lists, and transform sets.

Perfect Forward Secrecy

Ensures IPSec SA keys are not derived from other secrets for enhanced security.

Implementing Secure Shell on Cisco IOS XR Software

Prerequisites to Implementing Secure Shell

Lists required conditions and images for implementing Secure Shell.

Information About Implementing Secure Shell

Explains SSH server, client, SFTP feature, and AAA integration concepts.

How to Implement Secure Shell

Provides step-by-step procedures for configuring SSH server and client.

Implementing Secure Socket Layer on Cisco IOS XR Software

Prerequisites for Implementing Secure Socket Layer

Lists required conditions for SSL implementation, including key generation and CA enrollment.

Information About Implementing Secure Socket Layer

Explains SSL concepts, including the purpose of certification authorities.

How to Implement Secure Socket Layer

Provides procedures for configuring SSL, including key generation and trustpoint setup.

Configuring AAA Services on Cisco IOS XR Software

Prerequisites for Configuring AAA Services

Lists required conditions before configuring AAA services.

Information About Configuring AAA Services

Explains AAA concepts, users, groups, tasks, and administrative models.

How to Configure AAA Services

Procedures for configuring AAA services, including method lists and server communication.

Implementing Management Plane Protection on Cisco IOS XR Software

Restrictions for Implementing Management Plane Protection

Notes that out-of-band configurations for management traffic are not supported.

Information About Implementing Management Plane Protection

Explains management plane protection concepts, interfaces, and control plane.

How to Configure a Device for Management Plane Protection

Provides procedures for configuring MPP to restrict management traffic to specific interfaces.

Related product manuals