
Before You Begin 2-3
Considerations
Considerations
The following are considerations to observe when configuring a VPN on your Cisco 7100
series router:
• Syslog—Set up a syslog host, such as a CiscoWorks Essentials Workstation, and
configure all the routers in the network to use the syslog host. Logging all syslog
messages from the routers allows you to determine when significant events, like
configuration changes, occurred.
• Telnet and Console Access—In client-initiated or network access server
(NAS)-initiated access VPN environments, implement Terminal Access Controller
Access Control System Plus (TACACS+) or Remote Access Dial-In User Service
(RADIUS) security for Telnet and console access to the router. Doing so logs all access
to the router. The addition of access lists to only allow Telnet access from particular
source IP addressees helps to secure the router.
• Access Lists—Use access list numbers and names consistently to help manage and
troubleshoot configurations.
• Template Configurations—Use a configuration template when deploying many routers
that require consistent configurations.
• Tunneling—Observe the following when configuring tunneling:
— To avoid anomalies that occur on physical interfaces, configure each tunnel source
and destination on a loopback interface. A loopback interface is a virtual interface
that is always up and allows routing protocols to stay up even if the physical
interface is down.
— Process switching and fast switching of the GRE, IPSec, L2F, and L2TP tunneling
protocols, and Cisco Express Forwarding (CEF) of the IPSec tunneling protocol is
supported on Cisco 7100 series routers in Cisco IOS Release 12.0(4)XE or a later
12.0 XE software release, or Cisco IOS Release 12.0(6)T or a later 12.0 T software
release. CEF support of the L2F and L2TP tunneling protocols will be supported on
Cisco 7100seriesroutersin a futuremaintenancereleaseofCisco IOS softwareand
will be announced in the release notes that ship with the software.
Kommentare zu diesen Handbüchern