Contents

( D R A F T L A B E L ) A L P H A D R A F T - C I S C O C O N F I D E N T I A L

 

Interoperability Between ISA/ISM and VAM

2-2

 

Safety Guidelines 2-3

 

 

 

 

Safety Warnings

2-3

 

 

 

Electrical Equipment Guidelines 2-5

 

 

Preventing Electrostatic Discharge Damage

2-5

 

Compliance with U.S. Export Laws and Regulations Regarding Encryption 2-6

 

Removing and Installing the ISA and the ISM

 

C H A P T E R 3

3-1

 

Handling the ISA or the ISM

3-1

 

 

Online Insertion and Removal

3-2

 

 

Warnings and Cautions

3-3

 

 

 

ISA or ISM Removal and Installation

3-4

 

 

Cisco 7100

Series—Removing and Installing the ISM

3-5

 

Cisco 7200

Series—Removing and Installing the ISA

3-6

 

Configuring the ISA and ISM 4-1

 

 

C H A P T E R 4

 

 

 

Overview 4-1

 

 

 

 

Using the EXEC Command Interpreter

4-2

 

 

Enabling MPPE

4-2

 

 

 

Configuring IKE

4-3

 

 

 

Configuring IPSec 4-4

 

 

Creating Crypto Access Lists

4-4

Defining a Transform Set 4-5

 

Creating Crypto Maps

4-7

 

Applying Crypto Maps to Interfaces

4-9

Verifying Configuration

4-9

 

IPSec Example 4-12

 

 

Integrated Services Adapter and Integrated Services Module Installation and Configuration

 

ii

OL-3575-01 B0

 

 

 

Page 4
Image 4
Cisco Systems SA-ISA, SM-ISM manual Configuring the ISA and ISM