Manualsbrain.com
es
English
Deutsch
Français
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuales
Marcas
Cisco
Cisco ASR 5000
Cisco Cisco ASR 5000
Descargar
Me gusta
Pantalla completa
Estándar
Página
de
173
ir
IPSec Reference, StarOS Release 18 ▄
iii
CONTENTS
About this Guide ................................................................................................ ix
Conventions Used .................................................................................................................................... x
Supported Documents and Resources ....................................................................................................xi
Related Common Documentation ....................................................................................................... xi
Related Product Documentation ..................................................................................................... xi
Contacting Customer Support ................................................................................................................. xii
Introduction to IP Security (IPSec) .................................................................. 13
Overview ................................................................................................................................................. 14
IPSec AH and ESH ............................................................................................................................ 14
IPSec Transport and Tunnel Mode .................................................................................................... 14
Security Associations (SAs) and Child SAs ....................................................................................... 14
Anti-Replay (IKEv2) ............................................................................................................................ 15
IPSec Applications ............................................................................................................................. 15
IPSec Terminology ................................................................................................................................. 17
Crypto Access Control List (ACL) ...................................................................................................... 17
Transform Set ..................................................................................................................................... 17
ISAKMP Policy ................................................................................................................................... 17
Crypto Map ......................................................................................................................................... 18
Manual Crypto Maps (IKEv1) ......................................................................................................... 18
IKEv2 Crypto Maps ........................................................................................................................ 18
Dynamic Crypto Maps (IKEv1) ...................................................................................................... 18
Crypto Template ................................................................................................................................. 19
IKEv1 versus IKEv2 ................................................................................................................................ 20
Boost Crypto Performance ..................................................................................................................... 21
IPSec to Product Feature Mapping ................................................................. 23
PDSN, FA and HA .................................................................................................................................. 24
GGSN, FA and HA ................................................................................................................................. 25
ASNGW, HeNBGW, HNBGW and HSGW ............................................................................................. 26
SCM ........................................................................................................................................................ 27
ePDG ...................................................................................................................................................... 27
MME, S-GW, P-GW and SAE-GW ......................................................................................................... 28
SecGW ................................................................................................................................................... 29
IPSec Network Applications ............................................................................ 31
Implementing IPSec for PDN Access Applications ................................................................................ 32
How IPSec-based PDN Access Configuration Works ....................................................................... 32
Configuring IPSec Support for PDN Access ...................................................................................... 33
Implementing IPSec for Mobile IP Applications...................................................................................... 34
How IPSec-based Mobile IP Configuration Works ............................................................................. 34
Configuring IPSec Support for Mobile IP ........................................................................................... 36
RADIUS Attributes for IPSec-based Mobile IP Applications .............................................................. 38
Implementing IPSec for L2TP Applications ............................................................................................ 39
How IPSec is Used for Attribute-based L2TP Configurations ............................................................ 39
Configuring Support for L2TP Attribute-based Tunneling with IPSec ................................................ 40
How IPSec is Used for PDSN Compulsory L2TP Configuration ........................................................ 41
Configuring Support for L2TP PDSN Compulsory Tunneling with IPSec .......................................... 42
Anterior
Siguiente
1
2
3
4
5
…
173