Cisco Systems SA-ISA, SM-ISM manual Related Documentation, Viii

Page 10

Preface

Related Documentation

DTE—data terminal equipment

EPROM—erasable programmable read-only memory

EEPROM—electrically erasable programmable read-only memory

GB—gigabit

GBIC—Gigabit Interface Converter

Gbps—gigabits per second

MB—megabyte

Mbps—megabits per second

NVRAM—nonvolatile random-access memory

OIR—online insertion and removal

PCI—Peripheral Component Interconnect

PXF—Parallel eXpress Forwarding—A secondary processor used to accelerate Cisco IOS services

RFI—radio frequency interference

RISC—reduced instruction set computing

ROM—read-only memory

SDRAM—synchronous dynamic random-access memory

SDRAM-fixed—SDRAM of a fixed size or quantity; can be replaced, but not upgraded

SIMM—single in-line memory module

SNMP—Simple Network Management Protocol

SRAM—static random-access memory

TFTP—Trivial File Transfer Protocol

VAM—Virtual Private Network (VPN) Acceleration Module (VAM)

Cache—Memory with fast access and small capacity used to temporarily store recently accessed data; found either incorporated into the processor or near it.

Primary, secondary, tertiary cache—Hierarchical cache memory storage based on the proximity of the cache to the core of the processor. Primary cache is closest to the processor core and has the fastest access. Secondary cache has slower access than primary cache, but faster access than tertiary cache.

Instruction and data cache—Instructions to the processor and data on which the instructions work.

Unified cache—Instruction cache and data cache are combined. For example, a processor may have primary cache with separate instruction and data cache memory, but unified secondary cache.

Integrated cache—Cache that is built into the processor; sometimes referred to as internal cache. Cache memory that is physically located outside the processor is not integrated, and is sometimes referred to as external cache.

Related Documentation

Your router and the Cisco IOS software running on it contain extensive features and functionality, which are documented in the following resources:

Integrated Services Adapter and Integrated Services Module Installation and Configuration

 

viii

OL-3575-01 B0

 

 

 

Image 10
Contents Corporate Headquarters Text Part Number OL-3575-01 B0Copyright 1999- 2003 Cisco Systems, Inc All rights reserved N T E N T S Configuring the ISA and ISM Preface ObjectivesInstallation Warning AudienceSection Title Description Document OrganizationDocument Conventions Boldface fontItalic screen font Indicates a comment lineTerms and Acronyms ViiRelated Documentation ViiiCisco 7100 series routers Obtaining Documentation Cisco.comOrdering Documentation Documentation CD-ROMDocumentation Feedback Obtaining Technical Assistance Technical Assistance CenterObtaining Additional Publications and Information Cisco TAC Escalation CenterXiv Overview ISA and ISM OverviewData Encryption Overview Features Feature DescriptionPort Adapter Slot Locations on the Supported Platforms Cisco 7100 Series Routers Slot NumberingCisco 7200 Series Routers Slot Numbering Port adapter in slot ISM in slotLEDs LEDsBoot LED Label Color State FunctionOL-3575-01 B0 Preparing for Installation Required Tools and EquipmentPlatform Recommended Minimum Cisco IOS Release Encryption mppe command Safety GuidelinesSafety Warnings ISA and ISA ISA with VAMPreparing for Installation Safety Guidelines Electrical Equipment Guidelines Preventing Electrostatic Discharge DamageOL-3575-01 B0 Removing and Installing the ISA and the ISM Handling the ISA or the ISMOnline Insertion and Removal Handling the ISMRemoving and Installing the ISA and the ISM ISA or ISM Removal and Installation Cisco 7100 Series-Removing and Installing the ISM StepCisco 7200 Series-Removing and Installing the ISA GuideConfiguring the ISA and ISM OverviewEnables Mppe encryption Using the Exec Command InterpreterEnter controller configuration mode on Enabling MppeIdentify the policy to create, and enter Configuring IKEConfig-isakmp command mode Specify the encryption algorithmConfiguring IPSec Creating Crypto Access ListsDefining a Transform Set Step Command Purpose Creating Crypto Maps Access list determines which traffic is Crypto map configuration modeSpecify an extended access list. This Exit crypto map configuration modeApplying Crypto Maps to Interfaces Verifying ConfigurationExit interface configuration mode Apply a crypto map set to an interfaceCommand Purpose Router# show crypto ipsec sa interface Ethernet0 Configuring the ISA and ISM IPSec Example IPSec ExampleRouter B Configuration OL-3575-01 B0 D E IN-2