EasyManuals Logo

Cisco ISR 4000 series User Manual

Cisco ISR 4000 series
66 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #31 background imageLoading...
Page #31 background image
Cisco ISR 4000 Family Routers Administrator Guidance
Page 31 of 66
Crypto map entries also include transform sets. A transform set is an acceptable combination of
security protocols, algorithms, and other settings that can be applied to IPsec-protected traffic.
During the IPsec SA negotiation, the peers agree to use a particular transform set when protecting
a particular data flow.
4.6.1.1 IKEv1 Transform Sets
An Internet Key Exchange version 1 (IKEv1) transform set represents a certain combination of
security protocols and algorithms. During the IPsec SA negotiation, the peers agree to use a
particular transform set for protecting a particular data flow.
Privileged administrators can specify multiple transform sets and then specify one or more of these
transform sets in a crypto map entry. The transform set defined in the crypto map entry is used in
the IPsec SA negotiation to protect the data flows specified by that crypto map entry's access list.
During IPsec security association negotiations with IKE, peers search for a transform set that is
the same at both peers. When such a transform set is found, it is selected and applied to the
protected traffic as part of both peers' IPsec SAs. (With manually established SAs, there is no
negotiation with the peer, so both sides must specify the same transform set.)
Note: If a transform set definition is changed during operation that the change is not applied to
existing security associations, but is used in subsequent negotiations to establish new SAs. If you
want the new settings to take effect sooner, you can clear all or part of the SA database by using
the clear crypto sa command.
The following settings must be set in configuring the IPsec with IKEv1 functionality for the
TOE:
TOE-common-criteria # conf t
TOE-common-criteria (config)#crypto isakmp policy 1
TOE-common-criteria (config-isakmp)# hash sha
Note: md5 is not to be used in the evaluated configuration.
TOE-common-criteria (config-isakmp)# encryption aes
This configures IPsec IKEv1 to use AES-CBC-128 for payload encryption. AES-
CBC-256 can be selected with encryption aes 256’. These are the only allowed
ciphers in the evaluated configuration, and the other, less secure ciphers, are not to
be used.
Note: the authorized administrator must ensure that the keysize for this setting is
greater than or equal to the keysize selected for ESP in Section 4.6.2 below. If AES
128 is selected here, then the highest keysize that can be selected on the TOE for
ESP is AES 128.
Note: Both confidentiality and integrity are configured with the hash sha and
encryption aes commands respectively. As a result, confidentiality-only mode is
disabled.
TOE-common-criteria (config-isakmp)# authentication pre-share

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ISR 4000 series and is the answer not in the manual?

Cisco ISR 4000 series Specifications

General IconGeneral
Routing PerformanceUp to 2 Gbps
Switching CapacityVaries by model
Operating SystemCisco IOS XE
DimensionsVaries by model
WeightVaries by model
SeriesISR 4000
WAN PortsVaries by model
LAN PortsVaries by model
RedundancyYes
TypeModular
Routing ThroughputUp to 2 Gbps
MemoryUp to 16 GB
Modular SlotsVaries by model
Power SupplyAC or DC options
Product FamilyISR (Integrated Services Router)
ModelsISR 4321, ISR 4331, ISR 4351, ISR 4431, ISR 4451-X
StorageSSD options
Network InterfacesGigabit Ethernet, SFP
Security FeaturesFirewall, VPN
Virtualization SupportYes
ModularityYes
Operating Temperature0 to 40°C
Humidity5% to 95% noncondensing

Related product manuals