用户手册目录Contents3Preface7Audience7Warnings7Objectives8Organization8Related Documentation9Obtaining Documentation9Cisco.com9Product Documentation DVD10Ordering Documentation10Documentation Feedback10CiscoProduct Security Overview10Reporting Security Problems in CiscoProducts11Product Alerts and Field Notices11Obtaining Technical Assistance12CiscoTechnical Support & Documentation Website12Submitting a Service Request13Definitions of Service Request Severity13Obtaining Additional Publications and Information13Overview15Data Encryption Overview15VSA Overview16Hardware Required18Features18Performance19Supported Standards, MIBs, and RFCs19Standards19MIBs19RFCs19Enabling/Disabling the VSA20Disabling the VSA during Operation20Enabling/Disabling Scheme20LEDs21Connectors22Slot Locations22Cisco 7204VXR Router22Cisco 7206VXR Router24Preparing for Installation25Required Tools and Equipment25Hardware and Software Requirements25Software Requirements26Hardware Requirements26Restrictions26Online Insertion and Removal (OIR)27Safety Guidelines27Safety Warnings27Electrical Equipment Guidelines28Preventing Electrostatic Discharge Damage28Compliance with U.S. Export Laws and Regulations Regarding Encryption29Removing and Installing the VSA31Handling the VSA31Online Insertion and Removal (OIR)32Warnings and Cautions32VSA Removal and Installation32Configuring the VSA35Overview35Configuration Tasks35Using the EXEC Command Interpreter36Configuring an IKE Policy36Disabling VSA (Optional)38Configuring a Transform Set38Defining a Transform Set39IPSec Protocols: AH and ESP41Selecting Appropriate Transforms41The Crypto Transform Configuration Mode41Changing Existing Transforms42Transform Example42Configuring IPSec42Ensuring That Access Lists Are Compatible with IPSec42Setting Global Lifetimes for IPSec Security Associations42Creating Crypto Access Lists44Creating Crypto Map Entries44Creating Dynamic Crypto Maps46Applying Crypto Map Sets to Interfaces48Monitoring and Maintaining IPSec48Verifying IKE and IPSec Configurations49Verifying the Configuration50Configuration Examples52Configuring IKE Policies Example52Configuring IPSec Configuration Example52Basic IPSec Configuration Illustration53Router A Configuration53Router B Configuration54Troubleshooting Tips55Monitoring and Maintaining the VSA57Using Deny Policies in Access Lists57Configuration Guidelines and Restrictions58Monitor and Maintenance Commands58Index59文件大小: 1.1 MB页数: 62Language: English打开用户手册