Cisco Systems SM-ISM, SA-ISA manual Safety Guidelines, Safety Warnings, ISA and ISA ISA with VAM

Page 27

Chapter 2 Preparing for Installation

Safety Guidelines

If ISA and VAM are in the chassis at system bootup, and the encryption mppe command is in the router’s running configuration, then both ISA and VAM are enabled at system bootup. The ISA card supports MPPE, and the VAM supports ISAKMP/IPSec. You can enable encryption mppe by following the steps in “Configuring IPSec” section on page 4-4. To disable MPPE on an ISA card, use the no encryption mppe command. This disables the ISA.

To disable a card, use the no crypto engine accelerator type slot/port (port-adapter-slot-number/ interface-port-number) command.

Table 2-2 Interoperability Between ISA and VAM

ISA and ISA

ISA with VAM

 

 

 

 

Supports MPPE

Supports MPPE

 

 

 

 

Supports ISAKMP/IPSec

Supports ISAKMP/IPSec

 

 

If two ISAs are enabled in the chassis at

If ISA and VAM are enabled in the chassis at

 

power up, then both modules support both

 

power up, ISA is used for MPPE, and VAM is

 

MPPE and ISAKMP/IPSec.

 

used for ISAKMP/IPSec, provided the

 

 

 

router’s running configuration includes the

 

 

 

encryption mppe command.

 

 

If ISA is enabled in the chassis at bootup, and

If ISA is enabled in the chassis at bootup, and

 

another ISA is added later, the second ISA

 

VAM is added later, the VAM remains

 

immediately becomes active and depending

 

inactive until the next reboot, or until the

 

on the configuration, the system attempts to

 

configuration is changed to enable the VAM.

 

load-balance between the two ISAs.

 

 

 

 

 

 

Safety Guidelines

This section provides safety guidelines that you should follow when working with any equipment that connects to electrical power or telephone wiring.

Safety Warnings

Safety warnings appear throughout this publication in procedures that, if performed incorrectly, might harm you. A warning symbol precedes each warning statement.

Integrated Services Adapter and Integrated Services Module Installation and Configuration

 

OL-3575-01 B0

2-3

 

 

 

Image 27
Contents Text Part Number OL-3575-01 B0 Corporate HeadquartersCopyright 1999- 2003 Cisco Systems, Inc All rights reserved N T E N T S Configuring the ISA and ISM Objectives PrefaceAudience Installation WarningBoldface font Document OrganizationDocument Conventions Section Title DescriptionIndicates a comment line Italic screen fontVii Terms and AcronymsViii Related DocumentationCisco 7100 series routers Cisco.com Obtaining DocumentationDocumentation CD-ROM Ordering DocumentationDocumentation Feedback Technical Assistance Center Obtaining Technical AssistanceCisco TAC Escalation Center Obtaining Additional Publications and InformationXiv ISA and ISM Overview OverviewData Encryption Overview Feature Description FeaturesCisco 7100 Series Routers Slot Numbering Port Adapter Slot Locations on the Supported PlatformsPort adapter in slot ISM in slot Cisco 7200 Series Routers Slot NumberingLEDs LEDsLED Label Color State Function Boot OL-3575-01 B0 Required Tools and Equipment Preparing for InstallationPlatform Recommended Minimum Cisco IOS Release ISA and ISA ISA with VAM Safety GuidelinesSafety Warnings Encryption mppe commandPreparing for Installation Safety Guidelines Preventing Electrostatic Discharge Damage Electrical Equipment GuidelinesOL-3575-01 B0 Handling the ISA or the ISM Removing and Installing the ISA and the ISMHandling the ISM Online Insertion and RemovalRemoving and Installing the ISA and the ISM ISA or ISM Removal and Installation Step Cisco 7100 Series-Removing and Installing the ISMGuide Cisco 7200 Series-Removing and Installing the ISAOverview Configuring the ISA and ISMEnabling Mppe Using the Exec Command InterpreterEnter controller configuration mode on Enables Mppe encryptionSpecify the encryption algorithm Configuring IKEConfig-isakmp command mode Identify the policy to create, and enterCreating Crypto Access Lists Configuring IPSecDefining a Transform Set Step Command Purpose Creating Crypto Maps Exit crypto map configuration mode Crypto map configuration modeSpecify an extended access list. This Access list determines which traffic isApply a crypto map set to an interface Verifying ConfigurationExit interface configuration mode Applying Crypto Maps to InterfacesCommand Purpose Router# show crypto ipsec sa interface Ethernet0 IPSec Example Configuring the ISA and ISM IPSec ExampleRouter B Configuration OL-3575-01 B0 D E IN-2