Cisco Cisco Identity Services Engine 1.3 Merkblatt

Seite von 24
  
 
 
 
 
 
Cisco Systems © 2015 
20 페이지  
보안
 액세스 방법 가이드 
 protocol esp encryption aes-256               
 protocol esp integrity sha-1 md5 
crypto ipsec ikev2 ipsec-proposal AES192 
 protocol esp encryption aes-192 
 protocol esp integrity sha-1 md5 
crypto ipsec ikev2 ipsec-proposal AES 
 protocol esp encryption aes 
 protocol esp integrity sha-1 md5 
crypto ipsec ikev2 ipsec-proposal 3DES 
 protocol esp encryption 3des 
 protocol esp integrity sha-1 md5 
crypto ipsec ikev2 ipsec-proposal DES 
 protocol esp encryption des 
 protocol esp integrity sha-1 md5 
crypto ipsec ikev2 ipsec-proposal SAMPG-IKE 
 protocol esp encryption aes-256 aes-192 3des 
 protocol esp integrity sha-256 sha-1 
crypto ipsec security-association pmtu-aging infinite 
crypto dynamic-map REMOTE-ACCESS 10 set pfs group5 
crypto dynamic-map REMOTE-ACCESS 10 set ikev1 transform-set ESP-AES-256-SHA 
crypto dynamic-map REMOTE-ACCESS 10 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES 
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5 
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-
AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-
MD5 ESP-DES-SHA ESP-DES-MD5 
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES 
DES 
crypto map RA-IPSEC-VPN 10 ipsec-isakmp dynamic REMOTE-ACCESS               
crypto map RA-IPSEC-VPN interface outside 
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP 
crypto map inside_map interface inside 
crypto ca trustpoint ciscoca 
 enrollment terminal 
 subject-name CN=vpn.test.ocm 
 keypair sslvpnkeypair 
 crl configure 
subject-name CN=10.35.91.252,CN=vpn 
 crl configure 
crypto ca trustpoint ASDM_TrustPoint0 
 enrollment terminal 
 fqdn vpn.test.ocm 
 subject-name CN=vpn.test.ocm,OU=ISE,O=Cisco,C=US 
 crl configure 
crypto ca trustpoint ASDM_TrustPoint1 
 enrollment terminal 
 fqdn vpn.test.ocm 
 subject-name CN=vpn.test.ocm,OU=ISE,O=Cisco,C=US 
 keypair sslvpnkeypair 
 crl configure 
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_23 
 enrollment self 
 subject-name CN=10.35.91.252,CN=vpn 
 crl configure 
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_24 
 enrollment self 
 subject-name CN=10.35.91.252,CN=vpn 
 crl configure 
crl configure 
crypto ca trustpool policy 
crypto ca certificate chain ciscoca 
 
crypto ikev2 policy 1 
 encryption aes-256 aes-192 aes 3des 
 integrity sha256 sha md5 
 group 14 5 2 1 
 prf sha256 sha 
 lifetime seconds 86400 
crypto ikev2 remote-access trustpoint ciscoca 
crypto ikev1 enable outside 
crypto ikev1 enable inside 
crypto ikev1 policy 1 
 authentication pre-share