Manuals
/
Brands
/
Computer Equipment
/
Network Cables
/
Cisco Systems
/
Computer Equipment
/
Network Cables
Cisco Systems
C7200 manual
Please, tick the box below to download manual:
Contents
Main
Page
CONTENTS
Page
Page
Page
Preface
Audience
Warnings
Objectives
Organization
Related Documentation
Obtaining Documentation
Cisco.com
Product Documentation DVD
Ordering Documentation
Documentation Feedback
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Product Alerts and Field Notices
Obtaining Technical Assistance
Cisco Technical Support & Documentation Website
Submitting a Service Request
Definitions of Service Request Severity
Obtaining Additional Publications and Information
Page
Overview
Data Encryption Overview
VSA Overview
1 2 1
1 2
Hardware Required
Features
Performance
Supported Standards, MIBs, and RFCs
Standards
MIBs
RFCs
Enabling/Disabling the VSA
Disabling the VSA during Operation
Enabling/Disabling Scheme
LEDs
Connectors
Slot Locations
Cisco 7204VXR Router
1-9
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide OL-9129-02
Chapter1 Overview Slot Locations
RJ45
LINK
Cisco 7206VXR Router
The VSA is supported in the I/O controller port on the Cisco 7206VXR router (see 4 in Figure 1-5).
Figure1-5 Cisco 7206VXR - Front View
1Blank port adapter 3VSA in the I/O controller slot 2Port adapter
ETHERNET-10BFL
Preparing for Installation
Required Tools and Equipment
Hardware and Software Requirements
Software Requirements
Hardware Requirements
Restrictions
Online Insertion and Removal (OIR)
Safety Guidelines
Safety Warnings
Electrical Equipment Guidelines
Preventing Electrostatic Discharge Damage
Compliance with U.S. Export Laws and Regulations Regarding Encryption
Page
Removing and Installing the VSA
Handling the VSA
Online Insertion and Removal (OIR)
Warnings and Cautions
VSA Removal and Installation
Page
Page
Configuring the VSA
Overview
Configuration Tasks
Using the EXEC Command Interpreter
Configuring an IKE Policy
Page
Disabling VSA (Optional)
Configuring a Transform Set
Defining a Transform Set
Page
IPSec Protocols: AH and ESP
Selecting Appropriate Transforms
The Crypto Transform Configuration Mode
Changing Existing Transforms
Transform Example
Configuring IPSec
Ensuring That Access Lists Are Compatible with IPSec
Setting Global Lifetimes for IPSec Security Associations
Page
Creating Crypto Access Lists
Creating Crypto Map Entries
Page
Creating Dynamic Crypto Maps
Page
Applying Crypto Map Sets to Interfaces
Monitoring and Maintaining IPSec
Verifying IKE and IPSec Configurations
Verifying the Configuration
4-17
Configuration Examples
Configuring IKE Policies Example
Configuring IPSec Configuration Example
Basic IPSec Configuration Illustration
Router A Configuration
Router B Configuration
Troubleshooting Tips
4-22
Monitoring and Maintaining the VSA
Using Deny Policies in Access Lists
Configuration Guidelines and Restrictions
Monitor and Maintenance Commands
INDEX
A
B
C
I
creating definition
L
M
T
V
W