Cisco CISCO876-SEC-I-K9 Configuration Guide - Page 73
Con IPSec Transforms and Protocols - protection
UPC - 882658021800
View all Cisco CISCO876-SEC-I-K9 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 73 highlights
Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Configure IPSec Transforms and Protocols Step 3 Step 4 Command or Action Purpose aaa authorization {network | exec | commands Specifies AAA authorization of all level | reverse-access | configuration} {default | network-related service requests, including PPP, list-name} [method1 [method2...]] and specifies the method of authorization. Example: Router(config)# aaa authorization network rtr-remote local Router(config)# This example uses a local authorization database. You could also use a RADIUS server for this. For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. username name {nopassword | password password | password encryption-type encrypted-password} Example: Router(config)# username Cisco password 0 Cisco Router(config)# Establishes a username-based authentication system. This example implements a username of Cisco with an encrypted password of Cisco. Configure IPSec Transforms and Protocols A transform set represents a certain combination of security protocols and algorithms. During IKE negotiation, the peers agree to use a particular transform set for protecting data flow. During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at both peers. When such a transform set is found, it is selected and applied to the protected traffic as a part of both peers' configurations. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 6-7