Table of Contents
index
- configuring 4-12
- aaa authentication login default command 4-12
- aaa authorization auth-proxy default command 4-12
- aaa new-model command 4-12
- abbreviating commands, context-sensitive help 1-2
- accept dialin command 4-7, 4-9
- access control
- planning 2-5
- undefined packets and 3-55
- access control lists
- See ACL
- access-list (encryption) command 3-30
- access-list access-list-number permit tcp host source eq tacacs host destination command 4-12
- access-list command 3-53
- access-list permit ip host command 3-30
- access lists
- protecting from spoofing 2-6
- special considerations 2-3
- violating 2-4
- WFQ and 3-44
- See also extended access lists
- ACL
- CBWFQ 3-45
- address keyword, using (note) 3-25, 3-28
- AH
- ESP and (note) 3-32
- IP numbers 3-29
- arrow keys, on ANSI-compatible terminals (note) 1-2
- attaching service policies 3-50
- ip auth-proxy name auth-proxy-name http 4-15
- authentication, authorization, and accounting
- See AAA
- authentication command 3-21
- authentication header
- See AH
- authentication proxy
- configuring 4-11, 4-14
- verifying 4-16
- bandwidth command 3-42, 3-49
- broadcasts, disabling directed 2-6
- business scenarios
- figure 2-2
- overview 2-1
- description 3-18
- features 2-7
- carrier protocols (tunneling) 3-8
- CBWFQ
- configuring 3-45
- enabling 3-50
- verifying 3-50
- CDP, turning off 2-5
- CEF support 2-4, 4-5
- Certification Authority interoperability
- See CA interoperability
- changes, saving 1-11
- Cisco 7100 series routers
- installation assumptions 2-7
- ISM features 3-17
- Cisco Connection Online xv, xvi
- Cisco Discovery Protocol
- See CDP
- Cisco Express Forwarding
- See CEF support
- Cisco IOS firewall authentication proxy
- See authentication proxy
- Cisco IOS firewalls
- See firewalls
- Cisco Secure PIX Firewall
- locating documentation 3-51
- Cisco Secure VPN Client
- locating documentation 4-4
- Class-Based Weighted Fair Queuing
- See CBWFQ
- class class-default command 3-49
- class command 3-42, 3-49
- class map
- configuring 3-40
- verifying 3-41
- class-map command 3-40, 3-47
- class-map match-all 3-41
- class policy
- configuring 3-48
- clear crypto sa command 3-37
- command 4-15
- command modes
- command options 1-2
- online help 1-2
- summary (table) 1-9
- understanding 1-8
- configuration examples
- extranet
- business partner router 3-65 to 3-66
- headquarters router 3-61 to 3-64
- intranet
- headquarters router 3-56 to 3-58
- remote office router 3-59 to 3-60
- remote access
- L2TP/IPSec configuration 4-19
- PPTP/MPPE configuration 4-17
- configuration files
- corrupted 1-9
- saving changes 1-11
- saving to NVRAM 1-11
- configuration modes, using 1-9
- configuring
- AAA 4-12
- authentication methods with IKE policies 3-21
- authentication proxy 4-11, 4-14
- CBWFQ 3-45
- class maps 3-40
- class policy 3-48
- crypto maps 3-32
- encryption 3-17, 3-29, 4-10
- fair queuing 3-44
- firewalls 3-50
- GRE tunnels 3-3, 3-9 to 3-11
- HTTP server 4-14
- IKE policies 3-20
- IPSec 4-10
- IPSec tunnel mode 3-30
- L2TP 4-9
- L2TP/IPSec 4-8
- MPPE 4-8
- NAT 3-13
- NBAR 3-40
- policy maps 3-42
- PPTP 4-7
- PPTP/MPPE 4-5
- preshared keys 3-23, 3-27
- QoS 3-38
- virtual templates 4-6, 4-9
- console access considerations 2-3
- console ports
- breaks on 2-5
- configuring passwords on 2-5
- controller isa command 4-8
- crypto access lists
- commands (table) 3-30
- compatibility 3-33
- creating 3-29
- extended access lists versus 3-53
- verifying 3-30
- crypto ipsec transform-set command 3-31
- crypto isakmp enable command 3-20
- crypto isakmp identity address command 3-24
- crypto isakmp key address command 3-25
- crypto isakmp key command 3-24, 3-27
- crypto map command 3-34
- crypto map entries
- configuring 3-32
- creating 3-34
- defining IPSec processing 3-29
- verifying 3-35
- crypto maps
- applying to interfaces 3-36
- verifying interface associations 3-38
- crypto map s4second command 3-37
- customer service and support xv, xvi
- defining class maps 3-47
- demilitarized zone
- See DMZ network description
- denial-of-service attacks, directed broadcasts and 2-6
- Diffie-Hellman group identifier, specifying 3-21
- directed broadcasts
- See broadcasts
- DMZ network description 3-53
- documentation
- audience x
- CD-ROM xvi
- conventions xiv
- feedback xvi
- latest version xi
- organization xi
- purpose ix
- related xii
- enable password command 2-5
- enable secret command 2-5
- encapsulating security payload
- See ESP
- encryption
- configuring 3-17, 4-10
- description 3-17
- tunnels and 3-8
- encryption command 3-20
- encryption mppe command 4-8
- error messages
- ICMP Host Unreachable 3-55
- ESP
- AH and (note) 3-32
- IP numbers 3-29
- exit command 4-7, 4-10
- extended access lists
- creating 3-53
- description 3-51
- verifying 3-54, 3-55
- extranet VPN scenario
- description 2-2
- figure 3-5
- physical elements 3-5
- physical elements (figure) 3-6, 3-61
- physical elements (table) 3-6
- fair queuing
- configuring 3-44
- flow-based WFQ 3-44
- fast switching support 2-4
- firewalls
- basic traffic filtering configurations 3-52
- benefits 3-51
- configuring 3-50
- special considerations 2-5
- flow classification of packets 3-44
- See GRE tunnels
- global configuration mode, summary 1-9
- GRE tunnels
- Cisco routers or access servers (note) 3-10
- configuring 3-3, 3-9 to 3-10
- protocol 3-8
- troubleshooting configurations 3-11
- verifying 3-11
- See also intranet VPN scenario
- group command 3-21
- headquarters network scenario
- See intranet VPN scenario
- help
- command-line interface 1-1
- finding command options 1-2
- technical support xv, xvi
- help command 1-2
- hostname keyword, using (note) 3-25, 3-28
- HTTP server
- configuring 4-14
- IKE
- description 3-18
- keys
- See preshared keys
- policies
- configuration, required 3-21
- configuring 3-20
- defaults, viewing 3-11
- default values (note) 3-20
- enabling by default 3-19
- identifying 3-20
- RSA signatures method requirements 3-22
- troubleshooting 3-26
- verifying 3-25
- viewing 3-25
- SAs and 3-33
- UDP port 3-29
- inside global address 3-14
- inside local address 3-14
- inside network 3-13
- Integrated Service Module
- See ISM
- interface command 4-15
- interface configuration mode, summary 1-10
- interface fastethernet command 3-16
- interfaces
- applying crypto maps 3-36
- applying IP access lists 3-54
- verifying crypto map associations 3-38
- interface serial command 3-44
- interface tunnel command 3-9
- interface virtual-template number command 4-6
- Internet Key Exchange
- See IKE
- Internet Security Association & Key Management Protocol
- See ISAKMP identities
- intranet VPN scenario
- configuring 3-9
- description 2-2, 3-2
- figure 3-2
- physical elements 3-2
- physical elements (figure) 3-3, 3-56
- physical elements (table) 3-4
- intrusion detection 3-51
- ip access-group command 3-54
- ip access-list extended command 3-30
- IP access lists
- applying to interface 3-54
- for security 2-3
- inbound or outbound 3-54
- software checking of 3-55
- undefined 3-55
- See also extended access lists 3-53
- IP addresses
- NAT definitions 3-14
- nonregistered 3-13
- protecting internal 2-6
- renumbering 3-13
- static translation 3-14
- ip auth-proxy auth-cache-time command 4-14
- ip auth-proxy auth-proxy-banner command 4-14
- ip auth-proxy command 4-15
- IP datagrams
- in IPSec tunnel mode 3-12
- ip http access-class command 4-14
- ip http authentication aaa command 4-14
- ip http server command 4-14
- ip local pool default command 4-6
- ip mroute-cache command 4-7
- ip nat inside command 3-16
- ip nat inside source command 3-16
- ip nat outside command 3-16
- ip route command 3-10
- IPSec
- clearing SAs 3-37
- configuring 3-29, 4-10
- configuring tunnels 3-17
- description 3-18
- IP unicast frames 3-8
- proxies 3-12
- special considerations 2-4
- IPSec access lists
- explicitly permitting traffic (note) 3-29
- requirements 3-29
- IPSec tunnel mode
- configuring 3-30
- IP Security Protocol
- See IPSec
- IP tunneling concepts and terminology (figure) 3-8
- IP unicast frames, IPSec and 3-8
- ip unnumbered command 4-6
- ISAKMP identities, setting 3-25, 3-27
- ISM
- in Cisco 7100 series routers 3-17
- services 3-2, 4-2
- See preshared keys
- compatibility 4-5
- configuring 4-9
- verifying 4-10
- L2TP/IPSec
- configuring 4-8
- Layer 2 Tunneling Protocol
- See L2TP
- lifetime command 3-21
- 4-15
- local name command 4-7, 4-10
- loopback interfaces
- emulating interfaces 2-4
- using 3-34
- match address command 3-34
- match-all command 3-41
- match-any command 3-41
- match class-map command 3-41
- match input-interface command 3-48
- match not command 3-41
- match protocol command 3-41, 3-48
- Microsoft Dial-Up Networking 4-4
- Microsoft Point-to-Point Compression
- See MPPC
- Microsoft Point-to-Point Encryption
- See MPPE
- Microsoft Windows 2000 4-4
- Microsoft Windows 95 4-4
- Microsoft Windows 98 4-4
- Microsoft Windows NT 4.0 4-4
- modes
- See command modes
- mode tunnel command 3-31
- Modular QoS Command Line Interface
- See MQC
- MPPC 4-5
- MPPE
- configuring 4-8
- MQC 3-40
- address definitions 3-14
- configuring 3-13
- inside source translation (figure) 3-15
- source address translation process 3-15
- static translation process 3-16
- tunnels and 3-8
- verifying static inside source address translation 3-17
- NBAR
- attaching policy maps to interfaces 3-42
- configuring 3-40
- configuring class maps 3-40
- configuring policy maps 3-42
- verifying class map configuration 3-41
- verifying policy map configuration 3-43
- Network Address Translation
- See NAT
- network-based application recognition
- See NBAR
- network management applications
- special considerations 2-6
- Network Time Protocol
- See NTP
- no bandwidth command 3-42
- no cdp run command 2-5
- no class-map command 3-41
- no commands 1-10
- no ip directed-broadcast command 2-6
- no ip source-route command 2-6
- no match-all command 3-41
- no match-any command 3-41
- no police command 3-42
- no policy-map command 3-42
- no proxy-arp command 2-6
- no random-detect command 3-42
- no service-policy command 3-43
- no service tcp-small-servers command 2-6
- no service udp-small-servers command 2-6
- no set command 3-42
- no shutdown command 3-10
- NTP, turning off 2-5
- ntp disable command 2-5
- NVRAM, saving configuration to 1-11
- outside local address 3-14
- outside network 3-13
- passenger protocols (tunneling) 3-8
- passwords
- commands for setting 2-5
- port for configuring 2-5
- peer default ip address pool default command 4-6
- ping command 3-11
- PIX Firewall
- See Cisco Secure PIX Firewall
- Point-to-Point Tunneling Protocol
- See PPTP
- police bps conform transmit exceed drop command 3-42
- policies
- See IKE policies
- policy-map command 3-42, 3-49
- policy maps
- configuring 3-42
- verifying 3-43
- ppp authentication ms-chap command 4-6
- ppp encrypt mppe command 4-7
- PPTP
- configuring 4-7
- PPTP/MPPE
- configuring 4-5
- verifying 4-8
- preshared keys
- configuring 3-23, 3-27
- specifying 3-24, 3-27
- priority traffic
- See WFQ
- privileged EXEC mode, summary 1-9
- process switching support 2-4
- prompts, system 1-9
- protocol l2tp command 4-9
- protocol pptp command 4-7
- protocols, tunneling 3-8
- proxyacl#n command 4-13
- characteristics 3-38
- configuring 3-38
- queue-limit command 3-42, 3-49
- random-detect command 3-42
- Remote Access Dial-In User Service
- See RADIUS
- remote access VPN scenario
- physical elements (table) 4-3
- RFC 1631, IP Network Address Translator (NAT) 3-14
- Rivest, Shamir, and Adelman
- See RSA encrypted nonces method
- ROM monitor mode
- description 1-9
- summary 1-10
- RSA encrypted nonces method 3-22
- RSA signatures, configuration requirements for IKE 3-22
- IKE established
- crypto map entries, creating 3-33
- saving, configuration changes 1-11
- scenario description
- remote access scenario 4-2
- security associations
- See SAs
- service and support xv, xvi
- service policies
- attaching 3-50
- service-policy command 3-50
- service-policy input command 3-43
- service-policy output command 3-43
- set ip precedence command 3-42
- set peer command 3-35
- set qos-group command 3-42
- set transform-set command 3-35
- show access-lists command 3-30, 3-54
- show class-map command 3-41
- show crypto ipsec transform-set command 3-32
- show crypto isakmp policy command 3-20, 3-25
- show crypto map command 3-35
- show crypto map interface command 3-38
- show interfaces fair-queue command 3-45
- show interfaces ip command 3-55
- show interfaces serial command 3-45
- show interfaces tunnel command 3-11
- show ip auth-proxy cache command 4-16
- show ip auth-proxy configuration command 4-16
- show ip nat translations verbose command 3-17
- show policy-map command 3-43
- show policy policy-map command 3-50
- show running-config command 4-17, 4-19
- show version command 3-26
- show vpdn session command 4-8
- show vpdn tunnel command 4-8, 4-10
- source routing, disabling 2-6
- spoofing, protecting against 2-6
- startup configuration, saving 1-11
- static translation, IP addresses 3-14
- stub domain, NAT configured on 3-13
- subinterface configuration mode, summary 1-10
- syslog, special considerations 2-3
- TACACS+, implementing 2-3
- tacacs-server host command 4-12
- tacacs-server key command 4-12
- tail drop 3-48
- technical support xv, xvi
- Telnet access considerations 2-3
- template configurations, special considerations 2-3
- Terminal Access Controller Access Control System Plus
- See TACACS+
- traffic priority management
- See WFQ
- transform sets
- crypto map entries and 3-33
- defining 3-30
- verifying 3-32
- transport mode
- description 3-12
- IPSec (figure) 3-13
- transport protocols (tunneling) 3-8
- troubleshooting
- entering ROM monitor mode at startup 1-9
- extended access lists 3-55
- GRE tunnels 3-11
- IKE policy verification 3-26
- syslog message logs for 2-3
- tunnel destination command 3-10
- tunneling
- components 3-8
- description 3-7
- encryption in 3-8
- special considerations 2-4
- tunnel mode
- configuring 3-29
- description 3-12
- IPSec (figure) 3-13
- tunnel mode gre ip command 3-10
- tunnel source command 3-9
- authentication proxy 4-16
- CBWFQ 3-50
- class maps 3-41
- crypto access lists 3-30
- crypto map entries 3-35
- crypto map interface associations 3-38
- extended access lists 3-54, 3-55
- GRE tunnel configuration 3-11
- IKE policies 3-25
- IPSec tunnel mode 3-32
- L2TP 4-10
- PPTP/MPPE 4-8
- static inside source address translation 3-17
- transform sets 3-32
- WFQ configuration 3-45
- Virtual Private Networks
- See VPNs
- virtual-template command 4-7, 4-10
- virtual templates
- configuring 4-6, 4-9
- virtual terminal ports, protecting 2-5
- vpdn-enable command 4-7, 4-9
- vpdn-group 1 command 4-7, 4-9
- VPNs
- configuration assumptions 2-7
- See also extranet VPN scenario
- See also intranet VPN scenario
- See WFQ
- Weighted Random Early Detection
- See WRED
- WFQ
- configuring 3-44
- traffic priority management 3-44
- verifying configuration 3-45
- Windows 2000
- compatibility 4-5
- WRED
- CBWFQ 3-46







Posted: Mon Mar 6 13:44:59 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.