Cisco 7100 Series Spezifikationen Seite 53

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 112
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 52
Intranet VPN Business Scenario 3-23
Configuring IPSec
Note AH and ESP can be used independently or together, although for most applications
just one of them is sufficient. For both of these protocols, IPSec does not define the specific
security algorithms to use, but rather, provides an open framework for implementing
industry-standard algorithms.
2
hq-sanjose(cfg-crypto-trans)# mode
transport
Change the mode associated with the transform set.
The mode setting is only applicable to traffic whose
source and destination addresses are the IPSec peer
addresses; it is ignored for all other traffic. (All other
traffic is in tunnel mode only.) This example
configures transport mode for the transport set
proposal1.
3
hq-sanjose(cfg-crypto-trans)# exit
hq-sanjose(config)#
Exit back to global configuration mode.
1 AH = authentication header. This header, when added to an IP datagram, ensures the integrity and authenticity of the data, including
the invariant fields in the outer IP header. It does not provide confidentiality protection. AH uses a keyed-hash function rather than
digital signatures.
2 ESP = encapsulating security payload. This header, when added to an IP datagram, protects the confidentiality, integrity, and
authenticity of the data. If ESP is used to validate data integrity, it does not include the invariant fields in the IP header.
Step Command Purpose
Seitenansicht 52
1 2 ... 48 49 50 51 52 53 54 55 56 57 58 ... 111 112

Kommentare zu diesen Handbüchern

Keine Kommentare