Index: Cisco IOS Security Configuration Guide, Release 12.1
Symbols A C D E F G H I J K L M N O P Q R S T U
Symbols
- <$startange SC-442
- ? command xxxvii
A
- AAA
- accounting SC-81
- AV pairs SC-96
- command type SC-91
- configuration (example) SC-96
- connection type SC-86
- enabling SC-92
- EXEC type SC-89
- interim records SC-95
- method lists (example) SC-81
- methods (table) SC-93
- monitoring SC-96
- network configuration (figure) SC-83
- network type SC-84
- prerequisites SC-91
- server groups SC-82
- suppress records SC-94 to SC-95
- system type SC-90
- types SC-84 to SC-91
- ARA authentication SC-32 to SC-35
- authorized guest logins SC-33
- guest logins SC-34
- line password SC-34
- local password SC-34
- methods (table) SC-33
- TACACS+ SC-35
- authentication
- ARA SC-32 to SC-35
- configuration (examples) SC-53
- configuration procedure SC-24
- double authentication SC-41 to SC-44
- enable default SC-39
- login SC-25 to SC-27
- methods SC-24
- NASI SC-35 to SC-38
- network configuration (figure) SC-22
- PPP SC-28 to SC-30
- server groups SC-22
- authentication method lists SC-21
- authorization
- AV pairs SC-75
- configuration (examples) SC-76 to SC-80
- configuring SC-73
- description SC-69
- for global configuration commands SC-74
- method lists SC-69 to SC-71
- network configuration (figure) SC-71
- prerequisites SC-72
- RADIUS SC-74
- reverse telnet SC-75
- server groups SC-71
- TACACS+ SC-74
- types SC-72
- configuration process SC-19
- description SC-15 to SC-17
- disabling SC-19
- enable default authentication SC-39
- methods (table) SC-39
- enabling SC-19
- login authentication SC-25 to SC-27
- enable password SC-26
- Kerberos SC-27
- line password SC-27
- local password SC-27
- methods (table) SC-26
- RADIUS SC-27, SC-31, SC-35, SC-37
- TACACS+ SC-28, SC-31, SC-35, SC-38
- message banners
- configuring a failed-login banner SC-40
- configuring a login banner SC-40
- examples SC-57
- method lists
- accounting SC-81
- authentication SC-21
- authorization SC-69 to SC-71
- description SC-17
- NASI authentication SC-35 to SC-38
- enable password SC-37
- line password SC-37
- local password SC-37
- methods SC-36
- TACACS+ SC-38
- PPP authentication SC-28 to SC-30
- Kerberos SC-30
- local password SC-30
- RADIUS
- accounting SC-111
- authentication SC-110
- authorization SC-111
- server groups
- accounting SC-82
- authentication SC-22
- authorization SC-71
- RADIUS, configuring SC-108
- TACACS+, configuring SC-125
- aaa authentication ppp command
- undefined list name (caution) SC-50
- AAA scalability
- configuration example SC-56
- abbreviating commands
- context-sensitive help xxxvii
- access-enable command SC-181
- access-list (encryption) command SC-337, SC-378
- access-list (IP extended) command SC-180
- access-list command SC-179
- access lists
- applying to interfaces SC-166
- CBAC
- basic configuration SC-218
- configuring SC-217
- how it works SC-210
- creating SC-163
- criteria statements, order of SC-165
- description SC-161
- dynamic
- entries, deleting SC-184
- See also lock-and-key
- IP
- See also Reflexive Access Lists
- numeric ranges for protocols (table) SC-164
- reflexive SC-187
- specifying
- by name (table) SC-164
- by number (table) SC-164
- See also IKE
- See also IPSec, access lists
- See also IPSec, crypto access lists
- accounting
- See AAA accounting
- address command SC-419
- addressed-key command SC-403, SC-419
- AH
- description SC-371
- algorithms
- encryption
- See IKE, algorithms
- hash
- See IKE, algorithms
- anti-replay
- description SC-371, SC-411
- attack signatures
- See Cisco IOS Firewall IDS
- audit rule
- See Cisco IOS Firewall IDS, audit rule
- audit trail
- CBAC messages SC-234
- DNSIX facility SC-450
- See CBAC, audit trail
- authentication
- CAs SC-401
- for encryption SC-323
- neighbor router SC-12, SC-441
- benefits SC-441
- configuration information for protocols SC-445
- key chains SC-444
- MD5 SC-443
- plain text SC-442, SC-443
- process SC-442
- protocols SC-442
- types SC-442
- non-AAA methods SC-46
- static login SC-46
- username SC-47
- route SC-12
- route authentication SC-441
- user
- overview SC-11
- See also IKE, authentication
- See also lock-and-key
- Authentication, Authorization, and Accounting
- See AAA
- authentication command SC-416
- authentication header
- See AH
- authentication proxy SC-275
- applying SC-280
- CBAC requirement SC-285
- comparison with Lock-and-Key feature SC-283
- compatibility
- CBAC SC-282
- NAT SC-282
- VPN SC-283
- configuration tasks SC-285
- deleting cache entries SC-292
- denial-of-service attack protection SC-283
- description SC-275
- displaying dynamic ACL entries SC-291
- examples SC-292 to SC-305
- AAA server user profile SC-302
- IPSec, NAT, and CBAC SC-298
- IPSec and CBAC SC-294
- feature overview SC-3
- HTTP trigger SC-276
- login page (figure) SC-276
- login status message (figure) SC-277
- maintaining SC-291
- monitoring SC-291
- one-time passwords SC-280, SC-282
- operation SC-276
- operation with JavaScript SC-278
- operation without JavaScript SC-278
- prerequisites
- AAA SC-284
- access control lists SC-284
- browser SC-284
- CBAC SC-284
- restrictions SC-284
- risk of spoofing SC-283
- secure authentication SC-277
- using SC-279
- verifying configuration SC-285, SC-288
- when to use SC-279, SC-280
- authorization
- See AAA, authorization
- autocommand command SC-181
C
- CA interoperability
- description SC-320
- CAs
- authenticating SC-401
- certificates
- revoked SC-398
- declaring SC-400
- (example) SC-405
- description SC-395
- identity
- deleting SC-404
- IPSec
- implementing SC-396 to SC-397
- LDAP
- support SC-400
- public keys SC-401
- purpose SC-395
- URLs
- specifying SC-400
- See also certificates
- See also certification authority interoperability
- See also CRLs
- See also IPSec
- See also RAs
- cautions
- access lists SC-179, SC-338
- authenticating keys SC-442
- crypto engines, switching SC-345, SC-346
- DSS keys SC-349
- Java blocking SC-224
- lock-and-key SC-179
- neighbor authentication SC-442
- passwords
- encrypting (caution) SC-429
- Unicast RPF
- BGP optional attributes SC-458
- usage in text xxxi
- CBAC
- access lists
- configuring SC-217
- how it works SC-210
- application-layer protocols
- configuring SC-222
- audit trail SC-225
- audit trail messages
- (example) SC-234
- enabling SC-231
- authentication proxy compatibility SC-285
- configuration
- (example) SC-235 to SC-253
- guidelines SC-226
- viewing SC-227
- configuring SC-215 to SC-225
- verifying SC-227
- debugging SC-231 to SC-232
- denial-of-service attacks
- detection SC-220
- error messages SC-233
- indications SC-221
- description SC-205
- disabling SC-235
- displaying access list contents SC-227
- error messages
- audit trail SC-234
- denial-of-service attacks SC-233
- FTP attacks SC-234
- Java blocking SC-234
- SMTP attacks SC-233
- filtering
- Java blocking SC-206
- TCP traffic SC-206
- UDP traffic SC-206
- filtering, traffic SC-206
- firewall
- configuration, guidelines SC-226
- FTP attacks
- error messages SC-234
- FTP traffic SC-215
- H.323 inspection
- configuring SC-222
- multimedia support SC-213
- half-open sessions
- deleting SC-221
- description SC-221
- how it works SC-208
- inspection rules
- applying SC-225
- defining SC-222 to SC-225
- description SC-222
- viewing SC-227
- interfaces
- choosing SC-216
- external, tips SC-219
- internal, tips SC-220
- intrusion detection
- SMTP attacks SC-207
- IP packet fragmentation
- inspection SC-224
- IPSec compatibility SC-215
- Java
- blocking SC-206, SC-223
- blocking (caution) SC-224
- blocking, messages SC-234
- inspection, configuring SC-223
- limitations SC-207
- See also CBAC, restrictions
- logging SC-225
- memory usage SC-215
- multimedia support
- protocol inspection SC-213
- packet inspection SC-209
- PAM operation SC-310
- process SC-211
- protocol support (table) SC-212
- restrictions SC-214
- See also CBAC, limitations
- RPC inspection
- configuring SC-222
- RTSP inspection SC-213
- session information
- viewing SC-227
- SMTP attacks
- error messages SC-233
- state tables SC-210
- TCP inspection
- configuring SC-224
- thresholds
- configuring SC-220
- default values SC-220
- modifying SC-220
- timeouts
- configuring SC-220
- default values SC-220
- modifying SC-220
- traffic filtering
- UDP inspection
- configuring SC-224
- UDP sessions SC-210
- verifying configuration SC-227
- when to use SC-210
- CCO
- accessing xxxii
- definition xxxii
- certificate chain configuration mode
- enabling SC-404
- certificate command SC-404
- certificate revocation lists
- See CRLs
- certificates
- deleting SC-404
- description SC-394, SC-411
- requesting SC-401
- requests
- resending, number of times SC-400
- resending, wait period SC-400
- requirements
- RSA keys SC-399
- saving SC-399
- storing SC-398
- viewing SC-404
- See also CAs
- See also CRLs
- See also RSA keys
- certification authorities
- See CAs
- certification authority interoperability
- CA authentication SC-401
- configuration
- (example) SC-405
- saving your configuration SC-402
- description SC-393
- domain names
- configuration (example) SC-405
- configuring SC-399
- host names
- configuration (example) SC-405
- configuring SC-399
- NVRAM memory usage SC-399
- prerequisites SC-395
- restrictions SC-394
- supported standards SC-394
- See also CAs
- See also certificates
- See also CRLs
- See also RSA keys
- CET
- access lists, encryption SC-337
- (example) SC-356
- authenticating peer routers SC-323
- Cisco IOS implementation SC-322
- connection problems SC-350
- crypto engines SC-328
- Cisco IOS SC-329
- ESA SC-330
- VIP2 SC-329
- crypto maps SC-336
- applying to interfaces SC-339
- example SC-356
- defining SC-339
- example SC-356
- data encryption
- introduction SC-12
- DES algorithms SC-326
- defaults (global) SC-336
- enabling, globally SC-336
- enabling, globally (example) SC-356
- enabling in crypto maps SC-338
- types SC-336
- description SC-317
- DH SC-325
- exchanging numbers SC-325
- generating the DES key SC-326
- pregenerating numbers SC-347
- dropped packets SC-351
- DSS keys SC-325
- deleting SC-349
- (examples) SC-364
- exchanging SC-324, SC-333
- (example) SC-354
- generating SC-333
- (example) SC-353
- saving SC-333
- encapsulation SC-330
- ESA
- (examples) SC-363
- Cisco 7200 SC-342
- VIP2 SC-341
- fragmentation, IP SC-331
- GRE tunnels SC-340
- (example) SC-360
- IPSec
- comparison SC-318, SC-319
- comparison (table) SC-319
- using with SC-320
- multicast SC-331
- network topology SC-328
- number of sessions SC-332
- passwords (ESA) SC-352
- peer encrypting routers SC-323, SC-328
- performance impacts SC-332
- prework SC-328
- process SC-324
- purpose SC-322
- session keys SC-326
- session times SC-347
- standards implemented SC-323
- switching types SC-332
- tasks, basic SC-332
- testing and troubleshooting SC-350
- testing connections
- (example) SC-366
- turning off SC-349
- which packets are encrypted SC-323
- Challenge Handshake Authentication Protocol
- See CHAP
- CHAP
- authentication SC-47 to SC-50
- common password SC-50
- delay authentication SC-51
- description SC-47
- enable authentication SC-49
- refuse authentication requests SC-51
- Cisco Connection Online
- See CCO
- Cisco Encryption Technology
- See CET
- Cisco IOS
- saving configuration changes xl
- Cisco Secure IDS
- See Cisco IOS Firewall IDS, compatibility
- Cisco Secure Integrated Software
- See Cisco IOS Firewall
- Cisco IOS Firewall
- authentication proxy SC-275
- context-based access control (CBAC) SC-205
- description SC-169
- dynamic access lists SC-177
- feature set SC-170
- firewall solution SC-169
- Intrusion Detection System (IDS) SC-255
- port to application mapping (PAM) SC-307
- reflexive access lists SC-187
- See also authentication proxy
- See also CBAC
- See also Cisco IOS Firewall IDS
- See also dynamic access lists
- See also PAM
- See also reflexive access lists
- See also TCP intercept
- TCP intercept SC-199
- Cisco IOS Firewall IDS
- audit rule SC-257
- compatibility SC-256
- Cisco Secure IDS
- configuration (examples) SC-270 to SC-273
- configuring SC-264 to SC-269
- applying audit rules SC-267
- initializing, IDS SC-264
- verifying SC-269
- configuring, initializing, post office SC-265
- description SC-255, SC-257
- event logging SC-256
- monitoring and maintaining SC-269
- performance impact SC-258
- process SC-257
- response to threats SC-256
- sensor SC-256
- signature list SC-259 to SC-264
- signature types
- attack atomic SC-259
- attack compound SC-259
- info atomic SC-259
- info compound SC-259
- threat response SC-256
- usage scenarios SC-258
- when to use SC-257
- clear access-template command SC-184
- clear crypto isakmp command SC-423
- clear crypto sa command SC-391
- command modes
- summary (table) xxxvi
- command syntax conventions
- Cisco IOS documentation xxxi
- config-isakmp command mode
- enabling SC-416
- configuration, saving xl
- configurations
- saving SC-402
- Context-based Access Control
- See CBAC
- crl optional command SC-400
- CRLs
- downloading SC-402
- missing SC-400
- requesting SC-402
- saving SC-399
- storing SC-398
- crypto
- See CET
- crypto ca authenticate command SC-401
- crypto ca certificate chain command SC-404
- crypto ca certificate query command SC-399
- crypto ca crl request command SC-402
- crypto ca enroll command SC-401
- crypto ca identity command SC-400, SC-404
- crypto card clear-latch command SC-341, SC-343
- crypto card command SC-346
- crypto card enable command SC-344
- crypto cisco algorithm 40-bit-des command SC-336
- crypto cisco algorithm des command SC-336
- crypto cisco connections command SC-349
- crypto cisco entities command SC-349
- crypto cisco key-timeout command SC-347
- crypto cisco pregen-dh-pairs command SC-347, SC-349
- crypto dynamic-map command SC-389, SC-422
- crypto ipsec security-association lifetime command SC-376
- crypto ipsec transform-set command SC-382
- crypto isakmp enable command SC-413, SC-416
- crypto isakmp identity command SC-418
- crypto isakmp key command SC-420
- crypto key exchange dss command SC-334
- crypto key exchange dss passive command SC-334
- crypto key generate dss command SC-333
- crypto key generate rsa command SC-400, SC-418
- crypto key pubkey-chain rsa command SC-403, SC-419
- crypto key zeroize dss command SC-342, SC-344, SC-346, SC-349
- crypto key zeroize rsa command SC-403
- crypto map command SC-339, SC-385, SC-386
D
- data authentication
- description SC-371
- data confidentiality
- description SC-371
- Data Encryption Standard
- See DES
- data flow
- description SC-371
- debug crypto isakmp command SC-423
- debug ip inspect command SC-231
- default form of a command
- using xxxix
- denial-of-service attacks
- CBAC detection SC-220
- half-open sessions SC-221
- deploying Unicast RPF SC-459
- detection
- authentication proxy SC-283
- using Cisco IOS Firewall IDS SC-259
- mitigating IP address spoofing SC-459
- preventing
- reflexive access lists SC-188
- using TCP Intercept SC-199
- error messages
- See also CBAC, error messages attacks
- Department of Defense Intelligence Information System Network Security for Information Exchange
- See DNSIX
- DES
- description SC-371, SC-410
- IKE policy parameter SC-414
- See CET
- DH
- See also CET
- See IKE, DH
- Dialed Number Identification Service
- See DNIS
- Diffie-Hellman
- See DH
- Digital Signature Standard
- See DSS
- DMDP
- definition SC-451
- DNIS
- selecting server groups SC-109, SC-126
- DNSIX
- audit trail facility SC-450
- DMDP SC-451
- enabling SC-451
- extended IPSO fields SC-449
- hosts to receive messages SC-451
- Network Audit Trail Protocol SC-451
- transmission parameters SC-451
- dnsix-dmdp retries command SC-451
- DNSIX Message Deliver Protocol
- See DMDP
- dnsix-nat authorized-redirection command SC-451
- dnsix-nat primary command SC-451
- dnsix-nat secondary command SC-451
- dnsix-nat source command SC-451
- dnsix-nat transmit-count command SC-451
- documentation conventions
- Cisco IOS xxx
- domain names
- certification authority interoperability
- configuration (example) SC-405
- configuring SC-399
- double authentication
- access user profile SC-43
- configuring SC-42, SC-44
- operation SC-41
- DSS
- See CET
- dynamic crypto maps
- See IPSec, crypto maps
E
- encapsulating security payload
- See ESP
- encapsulation
- IPSec supported SC-373
- encrypted nonces
- See RSA encrypted nonces
- encryption
- IPSec
- See CET
- encryption algorithm
- See IKE, algorithms
- encryption command SC-416
- enrollment mode ra command SC-400
- enrollment retry-count command SC-400
- enrollment retry-period command SC-400
- enrollment url command SC-400
- ESP
- description SC-371
- examples
- CAs
- declaring SC-405
- CBAC configuration SC-235 to SC-253
- certification authority interoperability
- configuration SC-405
- domain names, configuring SC-405
- host names, configuration SC-405
- Cisco IOS Firewall IDS SC-270 to SC-273
- IKE
- configuration SC-423
- IPSec
- transform set, configuring SC-405
- IPSec configuration SC-392
- PAM configuration SC-312 to SC-313
- pre-shared keys
- configuration SC-423
F
- filtering
- See access lists
- firewalls
- CBAC guidelines SC-226
- Cisco IOS Firewall
- feature set SC-170
- solution SC-169
- configuring as SC-169
- creating SC-170
- description SC-169
- features SC-170, SC-171
- guidelines SC-174
- See also CBAC
- See also Cisco IOS Firewall
- FTP attacks
- CBAC error messages SC-234
G
- global configuration mode
- summary xxxvi
- group command SC-416
H
- H.323 inspection
- multimedia protocol support SC-213
- See CBAC, H.323 inspection
- hash algorithm
- See IKE, algorithms
- hash command SC-416
- help command xxxvii
- hijacking
- preventing SC-12
- hostname command SC-399
- host names
- certification authority interoperability
- configuration (example) SC-405
- configuring SC-399
I
- identification support
- configuring SC-437
- IDS
- See Cisco IOS Firewall IDS
- IKE
- access lists
- configuration SC-413
- algorithms
- encryption, specifying SC-416
- hash, specifying SC-416
- options SC-415
- anti-replay
- description SC-411
- authentication
- methods SC-415
- methods, specifying SC-416
- connections
- clearing SC-423
- debug messages SC-423
- description SC-320
- feature SC-409
- protocol SC-370, SC-410
- DH
- description SC-411
- group identifier, specifying SC-416
- IKE policy parameter SC-414
- disabling SC-413
- enabling SC-413
- group identifier
- specifying SC-416
- ISAKMP identity
- configuring SC-418
- keys
- See keys, pre-shared
- See RSA keys
- mode configuration SC-420
- configuring SC-421
- restrictions SC-421
- types SC-420
- negotiations
- successful SC-415
- unsuccessful SC-415
- policies
- configuration (example) SC-423
- configuration, required SC-417
- configuring SC-416
- creating SC-413 to SC-417
- defaults, viewing SC-417
- identifying SC-416
- multiple SC-416
- parameters SC-414
- parameters, choosing SC-415
- parameters, viewing SC-423
- purpose SC-414
- requirements SC-413
- viewing SC-416
- requirements
- access lists SC-413
- policies SC-413
- RSA encrypted nonces method SC-417
- RSA signatures method SC-417
- SAs SC-412
- supported standards SC-410
- troubleshooting SC-423
- tunnel endpoint discovery SC-421
- restrictions SC-422
- See also IPSec
- See also RSA encrypted nonces
- See also SAs
- initialization-vector size command SC-382
- inspection rules
- See CBAC, inspection rules
- interface command SC-180
- interface configuration mode
- summary xxxvi
- internet key exchange mode configuration SC-420
- See IKE, mode configuration
- Internet Key Exchange Security Protocol
- See IKE
- intrusion detection
- See Cisco IOS Firewall IDS
- intrusion detection system
- See Cisco IOS Firewall IDS
- IP
- access lists
- dynamic, deleting SC-184
- reflexive SC-187
- encryption
- introduction SC-12
- security
- See also lock-and-key
- See also TCP Intercept
- See also CET
- session filtering
- See Reflexive Access Lists
- ip access-group command SC-180
- ip domain-name command SC-399
- ip inspect audit trail command SC-231
- ip inspect command SC-225
- ip inspect dns-timeout command SC-221
- ip inspect max-incomplete high command SC-221
- ip inspect max-incomplete low command SC-221
- ip inspect name command SC-222
- ip inspect one-minute high command SC-221
- ip inspect one-minute low command SC-221
- ip inspect tcp finwait-time command SC-220
- ip inspect tcp idle-time command SC-220
- ip inspect tcp max-incomplete host command SC-221
- ip inspect tcp synwait-time command SC-220
- ip inspect udp idle-time command SC-220
- IP packet fragmentation
- See CBAC, IP packet fragmentation
- ip port-map command SC-311
- IPSec
- access lists SC-373
- requirements SC-375
- benefits SC-318
- CA certificates
- using SC-397
- CAs
- implementing with SC-397
- implementing without SC-396, SC-397
- CBAC compatibility SC-215
- CET
- comparison SC-318, SC-319
- comparison (table) SC-319
- using with SC-320
- configuration
- (example) SC-392
- configuring SC-375 to SC-391
- crypto access lists
- any keyword, using SC-381
- creating SC-377
- description SC-377
- manually established SAs SC-379
- mirror images SC-380
- purpose SC-377
- tips SC-378
- crypto map entries
- creating SC-383 to SC-390
- crypto maps
- applying SC-390
- dynamic, adding SC-390
- dynamic, creating SC-387, SC-388
- dynamic, definition SC-388
- purpose SC-383
- quantity SC-384
- description SC-317
- feature SC-369
- protocol SC-370
- encapsulation supported SC-373
- hardware supported SC-372
- how it works SC-373
- monitoring SC-391
- multiple peers SC-374
- NAT
- configuring SC-373
- network services SC-12, SC-369
- performance impacts SC-319
- prerequisites SC-375
- requirements
- SAs SC-412
- restrictions SC-373
- SAs
- clearing SC-382
- IKE negotiations SC-374, SC-386
- manual negotiations SC-374, SC-385
- See also SAs
- supported standards SC-370
- switching paths supported SC-373
- traffic protected
- defining SC-373
- transforms
- description SC-372
- transform sets
- changing SC-381
- configuration (example) SC-405
- defining SC-381
- tunnel endpoint discovery
- See IKE, tunnel endpoint discovery
- IPSec network security protocol
- See IPSec
- ip security add command SC-448
- ip security aeso command SC-450
- ip security dedicated command SC-448
- ip security eso-info command SC-450
- ip security eso-max command SC-450
- ip security eso-min command SC-450
- ip security extended-allowed command SC-448
- ip security first command SC-449
- ip security ignore-authorities command SC-448
- ip security implicit-labelling command SC-448
- ip security multilevel command SC-448
- IP Security Option
- See IPSO
- ip security reserved-allowed command SC-449
- ip security strip command SC-448
- IPSO
- (examples) SC-452
- basic SC-448
- configuration tasks SC-448
- defaults SC-449
- enabling SC-448
- processing SC-448
- security classifications SC-448
- extended SC-449
- AESOs, attaching SC-450
- configuration tasks SC-450
- ESOs attaching SC-450
- global defaults SC-450
- ip tcp intercept connection-timeout command SC-202
- ip tcp intercept drop-mode command SC-201
- ip tcp intercept finrst-timeout command SC-202
- ip tcp intercept list command SC-200
- ip tcp intercept max-incomplete high command SC-202
- ip tcp intercept max-incomplete low command SC-202
- ip tcp intercept mode command SC-201
- ip tcp intercept one-minute high command SC-203
- ip tcp intercept one-minute low command SC-203
- ip tcp intercept watch-timeout command SC-201
- ISAKMP
- description SC-410
- See also IKE
J
- Java blocking
- See CBAC, Java
K
- Kerberos
- authentication SC-143
- login SC-27
- PPP SC-30
- configuration (examples) SC-146 to SC-157
- configuring SC-139 to SC-145
- copying SRVTABs files SC-142
- creating SRVTABs SC-140
- credential forwarding SC-143
- extracting SRVTABs SC-141
- instance mapping SC-145
- KDC SC-139
- KDC database SC-140
- mandatory authentication SC-145
- network access server communication SC-141
- realms SC-141
- description SC-135
- Encrypted Kerberized Telnet SC-144
- maintaining SC-145
- monitoring SC-145
- operation SC-137 to SC-139
- Telnet to router SC-144
- terms (table) SC-136
- key distribution center
- See Kerberos, KDC
- keys
- chains SC-444
- management SC-444
- pre-shared
- configuration (example) SC-423
- configuring SC-420
- IKE policy parameter SC-414
- ISAKMP identity, configuring SC-418
- specifying SC-420
- RSA
- See RSA keys
- key-string command SC-419
L
- LDAP protocol support
- specifying SC-400
- lifetime command SC-416
- line vty command SC-181
- lock-and-key
- benefits SC-178
- configuration (examples) SC-184 to SC-186
- configuring SC-180
- examples SC-184 to SC-186
- prerequisites SC-180
- tips SC-181
- verification SC-183
- description SC-177
- maintenance tasks SC-184
- performance impacts SC-180
- process SC-178
- risk of spoofing SC-179
- when to use SC-178
- logging
- See CBAC, logging and audit trail
- login local command SC-181
- login tacacs command SC-181
M
- match address command SC-339, SC-386, SC-389
- MD5
- neighbor router authentication SC-443
- MD5 algorithm
- description SC-371, SC-411
- IKE policy parameter SC-414
- memory usage
- certification authority interoperability SC-399
- Message Digest 5
- See MD5 algorithm
- Message Digest Algorithm Version 5
- See MD5
- method lists
- AAA
- accounting SC-81
- authentication SC-21
- authorization SC-69 to SC-71
- description SC-17
- example SC-18
- Microsoft Challenge Handshake Authentication Protocol
- See MS-CHAP
- modes
- certificate chain configuration
- enabling SC-404
- public key configuration
- enabling SC-403
- query
- enabling SC-399
- RA
- enabling SC-400
- See command modes
- MS-CHAP
- configuration example SC-66
- feature summary SC-51
- vendor-specific RADIUS attributes SC-52
- multimedia
- application protocol support
- H.323 SC-214
- protocols (table) SC-212
- RTSP SC-213
N
- named-key command SC-403, SC-419
- NAT
- IPSec, configuring for SC-373
- neighbor router authentication
- See authentication, neighbor router
- network data encryption
- See CET
- no form of a command
- using xxxix
- no ip inspect command SC-235
- nonces
- See RSA encrypted nonces
- non-repudiation
- description SC-411
- notes
- usage in text xxxi
O
- Oakley key exchange protocol
- description SC-410
- See also IKE
- one-time passwords
- authentication proxy operation SC-282
- online documentation
- See CCO
P
- packet fragmentation
- See CBAC, IP packet fragmentation
- PAM
- CBAC operation SC-308
- configuration examples SC-312 to SC-313
- configuring
- access lists SC-311
- port mapping SC-311
- verifying SC-311
- default port mapping SC-308
- defining a port range SC-309
- deleting system-defined mapping information SC-308
- host-defined mapping SC-308
- host-specific mapping SC-310
- how PAM works SC-307
- mapping types
- host-specific SC-308, SC-310
- system-defined SC-308
- user-defined SC-308, SC-309
- monitoring and maintaining SC-312
- operation with CBAC SC-308, SC-310
- overriding system-defined mapping SC-308, SC-310
- port mapping
- default SC-308
- host-specific SC-310
- system-defined SC-308
- user-defined SC-309
- port range
- defining SC-309
- registered ports SC-308
- saving mapping information SC-309
- system-defined mapping SC-308
- deleting SC-308
- overriding SC-308, SC-310
- port numbers (table) SC-308
- registered ports SC-308
- table SC-308
- well-known ports SC-308
- system-defined port mapping SC-308
- table SC-308
- user-defined mapping SC-308, SC-309
- saving SC-309
- verifying SC-311
- well-known ports SC-308
- when to use SC-310
- PAP
- authentication SC-47 to SC-50
- description SC-47
- enable authentication SC-49
- outbound authentication SC-50
- Password Authentication Protocol
- See PAP
- password command SC-181
- passwords
- configuration (examples) SC-437 to SC-439
- configuring
- enable password SC-428
- enable secret SC-428
- line password SC-429
- static enable password SC-428
- encrypting SC-429
- (caution) SC-429
- recovering lost enable passwords SC-431
- procedure 1 SC-432
- procedure 2 SC-434
- procedures (tables) SC-431
- process SC-432
- recovering lost line passwords SC-436
- diagnostic mode settings (table) SC-437
- peer
- description SC-372
- perfect forward secrecy
- See PFS
- PFS
- description SC-372, SC-411
- plain text authentication
- See authentication, neighbor router
- Point-to-Point Protocol
- See PPP
- port mapping
- See PAM
- port range mapping
- See PAM
- port to application mapping
- See PAM
- PPP
- enable encapsulation SC-49
- inbound authentication SC-50
- outbound authentication SC-50
- pre-shared keys
- See keys, pre-shared
- privileged EXEC mode
- summary xxxvi
- privileges
- changing default SC-430
- configuration (examples) SC-437 to SC-439
- configuring
- multiple levels SC-430
- privilege level SC-430
- displaying current level SC-430
- logging in SC-431
- prompts
- system xxxvi
- protocol support
- CBAC (table) SC-212
- public key configuration mode
- enabling SC-403, SC-419
Q
- query mode
- enabling SC-399
- query url command SC-400
- question command xxxvii
R
- RADIUS
- accounting SC-111
- attributes SC-473
- IETF SC-480
- vendor-proprietary SC-111, SC-491
- authentication SC-110
- login SC-27, SC-31, SC-35, SC-37
- authorization SC-74, SC-111
- configuration (examples) SC-112 to SC-119
- configuring SC-101
- communication, global SC-104
- communication, per-server SC-104
- displaying NAS port types SC-107
- DNIS, server group selection SC-109
- multiple UDP ports SC-104
- queries for IP addresses SC-107
- queries for static routes SC-107
- server communication SC-104
- server groups SC-108
- server groups, DNIS selection SC-109
- tasks SC-103
- vendor-proprietary SC-106
- vendor-specific RADIUS attributes SC-106
- description SC-101
- operation SC-102
- server groups
- description SC-108
- DNIS selection SC-109
- RA mode
- enabling SC-400
- RAs
- description SC-398
- See also CAs
- Reflexive Access Lists SC-187
- benefits SC-188
- configuration (examples) SC-195 to SC-197
- configuring SC-192 to SC-195
- DMZ topology (figure) SC-191
- examples SC-195 to SC-197
- simple topology (figure) SC-191
- description SC-187
- how it works SC-189
- restrictions SC-190
- session filtering
- basic access lists
- reflexive access lists
- topology
- DMZ (figure) SC-191
- simple (figure) SC-191
- where to configure SC-189
- registration authorities
- See RAs
- Remote Authentication Dial-In User Service
- See RADIUS
- repudiation
- description SC-411
- RFC 1108
- IP Security Options SC-447
- RFC 1323
- window scaling SC-200
- RFC 1334
- PPP Authentication Protocols SC-48
- RFC 1413
- Identification Protocol SC-437
- RFC 1829
- The ESP DES-CBC Transform SC-371
- RFC 1994
- PPP Challenge Handshake Authentication Protocol (CHAP) SC-51
- RFC 2138
- RADIUS SC-111
- RFC 2139
- RADIUS Accounting SC-111
- RFC 2401
- Security Architecture for the Internet Protocol SC-370
- RFC 2402
- IP Authentication Header SC-370
- RFC 2408
- Internet Security Association and Key Management Protocol (ISAKMP) SC-410
- RFC 2409
- The Internet Key Exchange SC-410
- RFC 2410
- The NULL Encryption Algorithm and Its Use With IPsec SC-370
- ROM monitor mode
- summary xxxvi
- route authentication SC-441
- RPF
- See Unicast RPF
- RSA encrypted nonces
- description SC-411
- IKE policy parameter SC-414
- requirements SC-415, SC-417
- RSA keys
- deleting SC-403
- description SC-394
- generating SC-399, SC-418
- manually configuring SC-418
- purpose SC-399
- specifying SC-419
- viewing SC-404, SC-419
- See also certificates
- See also certification authority interoperability
- RSA signatures
- description SC-411
- IKE policy parameter SC-414
- requirements SC-415
- IKE configuration SC-417
- RTSP
- CBAC inspection SC-213
- CBAC support SC-213
S
- SAs
- clearing SC-376, SC-391
- description SC-372, SC-412
- establishing SC-412
- IKE established
- crypto map entries, creating SC-386
- lifetimes
- configuring SC-416
- global values, configuring SC-375
- global values, default values SC-376
- how they work SC-376
- IKE policy parameter SC-414
- manually established
- crypto access lists, defining SC-379
- crypto map entries, creating SC-385
- viewing SC-423
- saving configuration changes xl
- saving your configuration SC-402
- Secure Hash Algorithm
- See SHA
- security
- features SC-1
- IP
- denial-of-service attacks SC-199, SC-464
- IPSO SC-447
- See also DNSIX
- See also lock-and-key
- See also Reflexive Access Lists
- See also TCP Intercept
- TCP SYN-flooding attacks SC-199, SC-464
- neighbor router authentication SC-441
- policies
- creating SC-5
- nature of SC-6
- tips SC-6
- risks
- identifying SC-9
- preventing SC-9
- See also access lists
- See also authentication
- See also CET
- See also IPSec
- security associations
- See SAs
- security parameter index
- See SPI
- server groups
- AAA
- accounting SC-82
- authentication SC-22
- authorization SC-71
- RADIUS
- configuring SC-108
- TACACS+
- configuring SC-125
- session filtering
- See Reflexive Access Lists
- set algorithm 40-bit-des command SC-339
- set algorithm des command SC-339
- set peer command SC-339, SC-385, SC-386, SC-389, SC-422
- set pfs command SC-387, SC-390, SC-422
- set security-association level per-host command SC-387
- set security-association lifetime command SC-387, SC-389, SC-422
- set session-key command SC-386
- set transform-set command SC-386, SC-387, SC-389
- SHA
- description SC-411
- IKE policy parameter SC-414
- SHA algorithm
- description SC-371
- show access-lists command SC-184
- show crypto ca certificates command SC-404
- show crypto cisco algorithms command SC-336
- show crypto cisco connections command SC-350
- show crypto cisco key-timeout command SC-347
- show crypto crypto-engine connections active command SC-350
- show crypto dynamic-map command SC-392
- show crypto engine configuration command SC-346
- show crypto ipsec sa command SC-392
- show crypto ipsec security-association lifetime command SC-392
- show crypto ipsec transform-set command SC-392
- show crypto isakmp policy command SC-416, SC-417, SC-423
- show crypto isakmp sa command SC-423
- show crypto key mypubkey command SC-333, SC-346
- show crypto key mypubkey rsa command SC-404, SC-418
- show crypto key pubkey-chain rsa command SC-404, SC-419
- show crypto map command SC-350, SC-392
- show ip inspect command SC-227
- show ip port-map command SC-312
- show tcp intercept connections command SC-203
- show tcp intercept statistics command SC-203
- signature list
- See Cisco IOS Firewall IDS, signature list
- signatures
- attack
- See also Cisco IOS Firewall IDS, signature list
- See RSA signatures
- Skeme key exchange protocol
- description SC-410
- See also IKE
- SMTP attacks
- CBAC
- intrusion detection SC-207
- CBAC error messages SC-233
- SPI
- description SC-372
- spoofing attacks
- preventing SC-188
- See also Reflexive Access Lists
- standards
- IKE, supported by SC-410
- subinterface configuration mode
- summary xxxvi
- switching
- paths
- IPSec supported SC-373
T
- Tab key
- command completion xxxvii
- TACACS+
- accounting SC-128
- attribute-value pairs
- See AV pairs
- authentication
- login SC-28, SC-31, SC-35, SC-38
- NASI SC-38
- authorization SC-128
- AV pairs SC-128, SC-499 to SC-507
- accounting SC-507
- configuration (examples) SC-128 to SC-133
- accounting SC-131
- authentication SC-128
- authorization SC-130
- daemon SC-133
- configuring SC-123 to SC-128
- authentication SC-127
- authentication key SC-125
- DNIS, server group selection SC-126
- login input time SC-38
- server groups SC-125
- server groups, DNIS selection SC-126
- server host SC-124
- description SC-121
- operation SC-122
- server groups
- description SC-125
- DNIS selection SC-126
- TCP
- filtering
- See CBAC
- TCP Intercept
- configuration
- (example) SC-203
- connections
- displaying SC-203
- modes SC-201
- active intercept SC-201
- drop mode SC-201
- passive watch SC-201
- monitor and maintain SC-203
- overview SC-199
- statistics
- displaying SC-203
- thresholds SC-202
- timeouts SC-201
- TCP SYN-flooding attacks
- preventing
- using TCP intercept SC-199
- test crypto initiate-session command SC-350
- thresholds
- See CBAC, thresholds
- timeout intervals
- See CBAC, timeouts
- traffic filtering
- See access lists
- See CBAC, traffic filtering
- See lock-and-key
- transform
- See IPSec
- transforms
- tunnel endpoint discovery
- description SC-421
- See IKE, tunnel endpoint discovery
U
- UDP
- filtering
- See CBAC
- Unicast Reverse Path Forwarding
- See Unicast RPF
- Unicast RPF
- aggregation routers (figure) SC-462
- applying SC-459
- BGP attributes
- caution SC-458
- CEF
- requirement SC-456
- tables SC-462
- configuration SC-465
- examples SC-468 to SC-469
- configuring
- aggregation routers (figure) SC-462
- BOOTP SC-463
- DHCP SC-463
- enterprise network (figure) SC-460
- examples SC-468 to SC-469
- prerequisites SC-465
- routing table requirements SC-462
- tasks SC-465
- troubleshooting SC-467
- verifying SC-467
- deploying SC-459
- description SC-5, SC-455
- disabling SC-467
- dropping packets (figure) SC-458
- enterprise network (figure) SC-460
- FIB SC-456
- implementing SC-458
- maintaining SC-467
- monitoring SC-467
- prerequisites SC-465
- restrictions
- basic SC-463
- routing asymmetry SC-462
- routing asymmetry (figure) SC-463
- routing table requirements SC-462
- security policy
- applying SC-459
- deploying SC-459
- mitigating attacks SC-459
- tunneling SC-459
- source addresses
- validating SC-456
- validating (figure) SC-457
- validation failure SC-457
- validation failure (figure) SC-458
- traffic filtering SC-459
- troubleshooting SC-467
- tunneling SC-459
- validation
- dropping packets SC-457
- failure SC-457, SC-458
- source addresses SC-457
- verifying SC-467
- user EXEC mode
- summary xxxvi
Copyright 1989-2000
©
Cisco Systems Inc.