sc38book.html
Index

Table Of Contents

A - B - C - D - E - H - I - K - L - M - N - O - P - R - S - T - U - V -

Index

A

AAA (authentication, authorization, and accounting)

accounting services, enabling SC-52

authentication SC-9

authorization, enabling SC-50

configuring

AAA service restrictions SC-3

accounting method lists SC-45

authentication method lists SC-39

authorization method lists SC-41

individual users SC-22

login parameters SC-54

prerequisites for AAA services SC-3

RADIUS server groups SC-35

remote AAA SC-8

router to RADIUS server communication SC-24

services (examples) SC-55

TACACS+ server SC-32

TACACS+ server groups, SC-37

task groups for task-based authorization SC-18

user groups SC-20

database SC-7

interim accounting records, generating SC-48

per VRF (VPN routing and forwarding) definition SC-30

task-based authorization

task groups, definition SC-6

task IDs SC-12

user and group attributes SC-4

user groups

definition SC-5

inheritance SC-5

predefined SC-5

privilege level mapping as an alternative to task IDs SC-15

XML schema SC-15

aaa accounting command SC-48

aaa accounting update command SC-48

accept-lifetime command SC-221

accept-tolerance command SC-216

address ipv4 (MPP) command SC-243

address ipv6 (MPP) command SC-246

allow command SC-243, SC-246

antireplay window (IPSec)

checking a crypto profile SC-170

description SC-145

expanding and disabling globally procedure SC-169

auto-update definition SC-91

B

banner

definition SC-91

banner command SC-102

browser-proxy definition SC-91

C

certification authority interoperability

See also certificates; CRLs; IPSec; RAs

authenticating the CA SC-68

CA description SC-61

configuring

domain names (example) SC-64

host names (examples) SC-64

trusted points SC-66

description SC-268

generating RSA (Rivest, Shamir, and Adelman) key pairs SC-65

manual enrollment, cutting and pasting SC-70

requesting certificates from the CA SC-69

supported standards

Internet Key Exchange (IKE) Security protocol SC-61

IP Network Security (IPSec) protocol SC-61

Public-Key Cryptography Standard #10 (PKCS#10) SC-61

Public-Key Cryptography Standard #7(PKCS#7) SC-61

RSA (Rivest, Shamir, and Adelman) keys SC-61

Secure Socket Layer (SSL) protocol SC-61

X.509v3 certificate SC-61

Cisco Systems-supported security standards SC-79

clear crypto session command SC-90

clock set command SC-253

configuring

outbound traffic (key chain) SC-222

control-plane command SC-243

control plane protection, MPP

CoPP (Control Plane Policing) SC-241

definition SC-241

cryptographic-algorithm command SC-223

crypto ipsec df-bit command SC-167

crypto ipsec pmtu command SC-192

crypto ipsec pre-fragmentation command SC-177

crypto ipsec profile command SC-170

crypto ipsec security-association idle-time command SC-174

crypto ipsec security-association replay disable command SC-169

crypto ipsec security-association replay window-size command SC-169

crypto ipsec server send-update command SC-91

crypto ipsec transform-set command SC-160

crypto isakmp client configuration group command SC-102

crypto keyrings

configuring SC-116

guidelines and restrictions SC-116

crypto mib ipsec flowmib history failure size command SC-182

crypto nat-transparency command SC-172

D

deadtime command SC-36

DES (Data Encryption Standard)

IKE policy parameter SC-82

description (ISAKMP peer) command SC-90

DF (Don't Fragment) bit override

configuring SC-167

description SC-144

DPD (Dead Peer Detection) message, configuring SC-126

E

Easy VPN (Virtual Private Network) features

auto-update SC-91

banner SC-91

URL configuration description SC-92

encryption algorithm

See also IKE algorithms

end-time, key chain management SC-214

H

hash algorithm

See IKE, algorithms

high availability overview SC-149

hitless key rollover

accept-tolerance command SC-216

hitless key rollover, configuring SC-216

I

IKE (Internet Key Exchange Security Protocol)

Advanced Encryption Standard (AES)

definition SC-80

algorithms

encryption SC-95

hash SC-96

MD5 (Message Digest 5) SC-80

options SC-83

SHA (Secure Hash Algorithm), definition SC-80

authentication methods SC-83, SC-96

Call Admission Control (CAC)

limiting CPU resources consumed SC-89

Call Admission Control (CAC) definition SC-89

configuring

a banner as a client group attribute for Cisco Easy VPN Server SC-102

auto-update as a group attribute for the Cisco Easy VPN Server SC-103

browser-proxy as a client group attribute for the Cisco Easy VPN Server SC-105

client group attributes for Cisco Easy VPN Server SC-102

IKE security association (SA) limit for call admission control SC-112

ISAKMP group policy attributes SC-97

ISAKMP identity SC-85

policies SC-95

definition SC-79

DES (Data Encryption Standard)

definition SC-80

DH (Diffie-Hellman)

IKE policy parameter SC-82

specifying the group identifier SC-96

DPD (Dead Peer Detection)

periodic message SC-93

Easy VPN (Virtual Private Network) features

browser-proxy SC-91

enabling and disabling SC-93

enabling config-isakmp command mode SC-95

extended authentication SC-88

Internet Security Association and Key Management Protocol (ISAKMP)

definition SC-80

ISAKMP peer description SC-90

keyring configuration mode enablement SC-109

keys

mask preshared SC-86

preshared

configuring (example)     1

See keys, preshared; keys, preshared using AAA server; RSA keys

negotiations SC-82

Oakley Key Exchange Protocol definition SC-80

policies

configuring (example) SC-128

identifying SC-95

multiple SC-84

parameters SC-83

purpose SC-81

viewing SC-96

Public Key Cryptographic Protocol

Diffie-Hellman SC-80

public key cryptographic system

RSA (Rivest, Shamir, and Adelman)

signatures     1

requirements

RSA encrypted nonces method SC-85

RSA signatures method SC-85

RFC 2408, ISAKMP SC-80

RSA (Rivest, Shamir, and Adelman)

encrypted nonces SC-80, SC-82

signatures

authentication method     1

Skeme Key Exchange Protocol

definition SC-80

VPN monitoring

adding an IKE peer description SC-118

clearing a crypto session SC-90, SC-120

X.509v3 certificates standard SC-81

See also IPSec; RSA encrypted nonces; SAs

inband management interface, MPP

allow command SC-243

definition SC-240

inband command SC-243

interface command SC-243

interface service-gre command SC-149

interface service-ipsec command SC-148

IP Network Security Protocol (IPSec)

definition SC-80

IPSec (IP Network Security Protocol)

CAs

implementing with SC-63

implementing without SC-63

checkpointing SC-144

configuring

default path MTU (maximum transmission unit) SC-192

IPSec failure history table size SC-182

NAT transparency SC-172

crypto access lists SC-142

cautions, creating SC-183

creating SC-158

purpose SC-142

crypto profiles SC-140

applying to transport SC-184

applying to tunnel-ipsec interfaces SC-183

configuring static or dynamic SC-161

dynamic crypto profile description SC-141

IPSec-protected GRE virtual interfaces, configuring SC-189

IPSec VPN SPA

antireplay window SC-145

DF bit override description SC-144

NAT transparency SC-145

prefragmentation SC-145

restrictions SC-139

load balancing SC-149

PFS (perfect forward secrecy) description SC-144

prerequisites for implementation SC-139

restrictions for implementation SC-139

setting global lifetimes SC-156

transform sets

defining SC-160

description SC-142

virtual interfaces

configuring IPSec-protected GRE SC-189

virtual interfaces (IPSec)

description SC-148

IPSec support for SNMP (Simple Network Management Protocol) SC-147

IPSec VPN SPA

description SC-147

displaying the SPA hardware type SC-147, SC-196

DPD message SC-93

load balancing and high availability SC-149

SA idle timers SC-145

ISAKMP

See also IKE

ISAKMP profile

description SC-86

locally sourced and destined traffic procedure SC-121

K

key (key chain) command SC-218

key chain command SC-215

key chain management

configuring SC-215, SC-225

key identifiers SC-217

key string text SC-219

outbound traffic SC-222

description SC-214

end-time SC-214

key lifetime SC-214

key validation SC-220

start-time SC-214

keyring command SC-121

key-string command SC-220

L

lawful intercept, implementing SC-229

M

MAC (message authentication code) SC-223

authentication option SC-214

cryptographic algorithm procedure SC-223

management plane

MPP feature SC-242

management-plane command SC-243

match identity command SC-121

MD5 (Message Digest 5)

IKE policy parameter SC-82

MPLS (Multiprotocol Label Switching), encapsulated packets SC-149

MPP (Management Plane Protection)

benefits SC-242

control plane protection SC-241

description SC-239, SC-242

device configuration SC-243

management interface

inband SC-240

out-of-band SC-241

management plane

description SC-241

peer-filtering option SC-241

N

NAT transparency (IPSec) description SC-145

O

Oakley key exchange protocol

See also IKE

out-of-band command SC-246

out-of-band management interface, MPP

definition SC-241

P

peer-filtering option

definition SC-241

peer keyword

inband interface SC-244

out-of-band interface SC-247

per VRF (VPN routing and forwarding) AAA

procedure SC-30

server-private command SC-31

supported VSAs SC-30

prefragmentation

dependencies SC-146

description SC-145

disabling

service-gre interfaces SC-178

service-ipsec interfaces SC-177

preshared keys

using the AAA Server SC-87

R

RADIUS

configuring

dead-server detection SC-28

UDP ports SC-25

operation SC-17

radius-server dead-criteria time command SC-29

radius-server dead-criteria tries command SC-29

radius-server deadtime command SC-28

RAs (registration authorities)

See CAs

reverse-route command SC-162, SC-180

RFC 2409, The Internet Key Exchange SC-79

RRI (reverse-route injection)

configuring in a crypto profile SC-180

description SC-150

RSA (Rivest, Shamir, and Adelman)

encrypted nonces

requirements SC-84, SC-85

keys

configuring manually SC-106

configuring peers SC-108

deleting SC-66

generating SC-106

signatures SC-85

requirements SC-84

S

SA (security association) for IPSec VPN SPA

idle timers

configuring for each crypto profile SC-175

configuring globally SC-174

description SC-145

lifetimes SC-174

SAM (Software Authentication Manager) description SC-253

SAs (security associations)

lifetimes

configuring SC-96

global values     1

IKE policy parameter SC-82

operation SC-143

resource limit configuration SC-114

self-identity command SC-121

send-lifetime command SC-223

server-private command SC-31, SC-35

service-location command SC-148

set interface tunnel-ipsec command SC-121

set pfs command SC-144

set security-association idle-time command SC-162

set security-association lifetime command SC-162

set security-association replay disable command SC-162

set session-key inbound ah command SC-162

set session-key inbound esp command SC-162

set session-key outbound ah command SC-162

set session-key outbound esp command SC-162

SHA (Secure Hash Algorithm)

IKE policy parameter SC-82

show crypto session command SC-90

show diags command SC-147

show key chain command SC-216

show mgmt-plane command SC-243

show radius dead-criteria host command SC-29

show route command SC-180, SC-186, SC-190

Skeme key exchange protocol

See also IKE

SSH (Secure Shell)

client

3DES support SC-258

configuring SC-262

description SC-258

server support SC-258

configuring SC-258

prerequisites SC-256

restrictions SC-256

server SC-257

SFTP (Standard File Transfer Protocol) description SC-258

supported versions SC-255

troubleshooting SC-263

SSL (Secure Socket Layer)

configuring SC-269

description SC-267

prerequisites SC-268

start-time, key chain management SC-214

static IPSec virutal interfaces, configuring SC-186

T

tunnel vrf (IPSec) command SC-149

U

URL configuration description SC-92

V

VPN monitoring

enhancements SC-89

per-IKE peer, function SC-90

summary status SC-90

vrf (AAA) command SC-31

vrf (IPSec) command SC-149

vrf (MPP) command SC-246

vrf-aware (IPSec) description SC-149

VSAs (vendor-specific attributes)

per VRF AAA SC-30

supported VSAs SC-30