cc/td/doc/product/core/7206/7206cfig
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Overview

Overview

This chapter describes the ISA and the ISM and contains the following sections:

ISA and ISM Overview

The ISA is a single-width service adapter and the ISM is a single-width service module. Each provides high-performance, hardware-assisted tunneling and encryption services suitable for virtual private network (VPN) remote access, site-to-site intranet, and extranet applications, as well as platform scalability and security while working with all services necessary for successful VPN deployments---security, quality of service (QoS), firewall and intrusion detection, and service-level validation and management. The ISA and the ISM off-load IPSec and MPPE processing from the main processor of the Cisco 7200 series or Cisco 7100 series router, thus freeing resources on the processor engines (that is, the network processor engine [NPE] on the Cisco 7200 series, and the network processor [NP] on the Cisco 7100 series routers) for other tasks.

The ISA and the ISM provide hardware-accelerated support for multiple encryption functions:


Note Cisco 7100 series routers do not support online insertion and removal of the ISM.

Note Cisco 7200 series routers support online insertion and removal of the ISA.

Data Encryption Overview

The ISA and the ISM support IPSec, IKE, Microsoft Point to Point Encryption (MPPE), and Certification Authority (CA) interoperability features, providing highly scalable remote access VPN capabilities to Microsoft Windows 95/98/NT systems.

MPPE in conjunction with Microsoft's Point-to-Point tunneling protocol (PPTP) provides security for remote Microsoft Windows users by providing a tunneling capability, user-level authentication, and data encryption.


Note For more information on IPSec, IKE, MPPE, and CA interoperability, refer to the "IP Security and Encryption" chapter in the Security Configuration Guide and Security Command Reference publications.

IPSec acts at the network level and is a framework of open standards developed by the Internet Engineering Task Force (IETF) that provides security for transmission of sensitive information over unprotected networks such as the Internet. IPSec services are similar to those provided by Cisco Encryption Technology (CET). However, IPSec provides a more robust security solution and is standards-based. IPSec also provides data authentication and antireplay services in addition to data confidentiality services, whereas CET provides data confidentiality services only.

Cisco implements the following standards with data encryption:

IPSec is documented in a series of Internet Drafts. The overall IPSec implementation is documented in RFC 2401 through RFC 2412 and RFC 2451.

The component technologies implemented for IPSec include:

IPSec as implemented in Cisco IOS software supports the following additional standards:

The AH protocol allows for the use of various authentication algorithms; Cisco IOS has implemented the mandatory MD5 and SHA (HMAC variants) authentication algorithms. The AH protocol provides antireplay services.

LEDs

The ISA has three LEDs, as shown in Figure 1-1. Table 1-1 lists the colors and functions of the ISA LEDs.


Figure 1-1: ISA Front Panel LEDs (SA-ISA shown)



Table 1-1:
LED Label Color State Function

ENABLE

Green

On

Indicates the ISA is powered up and enabled for operation.

BOOT

Amber

Pulses1

On

Indicates the ISA is operating.

Indicates the ISA is booting or a packet is being encrypted or decrypted.

ERROR

Amber

On

Indicates an encryption error has occurred.

This LED is normally off.

1After successfully booting, the boot LED pulses in a "heartbeat" pattern to indicate that the ISA is operating. As crypto traffic increases, the nominal level of this LED increases in proportion to the traffic level.
ISA LEDs

The following conditions must all be met before the enabled LED goes on:

If either of these conditions is not met, or if the router initialization fails, the enabled LED does not go on.

The ISM has three LEDs, as shown in Figure 1-2. Table 1-2 lists the colors and functions of the LEDs.


Figure 1-2: ISM LEDs

Note 
The physical orientation of the ISM LEDs is reversed from that of the ISA (see Figure 1-2).

Table 1-2:
LED Label Color State Function

EN

Green

On

Indicates the ISM is powered up and enabled for operation.

BOOT

Amber

Pulses1

On

Indicates the ISM is operating.

Indicates the ISM is booting or a packet is being encrypted or decrypted.

ERROR

Amber

On

Indicates an encryption error has occurred. This LED is normally off.

1After successfully booting, the boot LED pulses in a "heartbeat" pattern to indicate that the ISM is operating. As crypto traffic increases, the nominal level of this LED increases in proportion to the traffic level.
ISM LEDs

The following conditions must all be met before the enabled LED goes on:

If either of these conditions is not met, or if the router initialization fails for other reasons, the enabled LED does not go on.

Port Adapter Slot Locations on the Supported Platforms

Cisco 7100 Series Routers Slot Numbering

The ISM can be installed in service module slot 5 in Cisco 7120 series and Cisco 7140 series routers. Figure 1-3 shows a Cisco 7120 with an ISM installed in slot 5. Figure 1-4 shows a Cisco 7140 with an ISM installed in slot 5.


Figure 1-3: Service Module Slot 5 in the Cisco 7100 Series Router---Cisco 7120 Series



Figure 1-4:
Service Module Slot 5 in the Cisco 7100 Series Router
---Cisco 7140 Series

Cisco 7200 Series Routers Slot Numbering

Figure 1-5 shows a Cisco 7206 with port adapters installed. In the Cisco 7206, port adapter slot 1 is in the lower left position, and port adapter slot 6 is in the upper right position. (The Cisco 7202 and Cisco 7204 are not shown; however, the ISA can be installed in any available port adapter slot.)


Figure 1-5: Port Adapter Slots in the Cisco 7206



hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Mar 13 09:09:12 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.