Contents

C H A P T E R 7

C H A P T E R 8

C H A P T E R 9

Apply the Crypto Map to the Physical Interface

6-8

 

Create an Easy VPN Remote Configuration 6-9

 

 

Verifying Your Easy VPN Configuration

6-10

 

 

Configuration Example

6-10

 

 

 

 

Configuring VPNs Using an IPsec Tunnel and Generic Routing Encapsulation 7-1

Configure a VPN 7-2

 

 

 

 

 

Configure the IKE Policy

7-3

 

 

 

Configure Group Policy Information

7-4

 

 

Enable Policy Lookup

7-5

 

 

 

Configure IPsec Transforms and Protocols

7-5

 

Configure the IPsec Crypto Method and Parameters 7-6

Apply the Crypto Map to the Physical Interface

7-7

Configure a GRE Tunnel

7-8

 

 

 

 

Configuration Example

7-9

 

 

 

 

Configuring a Simple Firewall

8-1

 

 

 

Configure Access Lists

8-3

 

 

 

 

Configure Inspection Rules

8-4

 

 

 

Apply Access Lists and Inspection Rules to Interfaces

8-4

Configuration Example

8-5

 

 

 

 

Configuring a Wireless LAN Connection

9-1

 

 

Configure the Root Radio Station 9-2

 

 

 

Configure Bridging on VLANs

9-4

 

 

 

Configure Radio Station Subinterfaces

9-5

 

 

Configuration Example

9-6

 

 

 

 

P A R T 3

 

Configuring Additional Features and Troubleshooting

 

 

Additional Configuration Options 10-1

C H A P T E R

10

 

 

Configuring Security Features 11-1

C H A P T E R

11

Authentication, Authorization, and Accounting 11-1

Configuring AutoSecure

11-2

Configuring Access Lists

11-2

 

Access Groups

11-3

 

 

 

 

 

Cisco Secure Router 520 Series Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

OL-14210-01

 

 

v

 

 

 

 

 

Page 5
Image 5
Cisco Systems 520 series manual Additional Configuration Options