Cisco 7100 Series Spezifikationen Seite 86

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 112
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 85
Step 2—Configuring Encryption and an IPSec Tunnel
Cisco 7100 Series VPN Configuration Guide
4-14
Note AH and ESP can be used independently or together, although for most applications
just one of them is sufficient. For both of these protocols, IPSec does not define the specific
security algorithms to use, but rather, provides an open framework for implementing
industry-standard algorithms.
2
hq-sanjose(cfg-crypto-trans)# mode
tunnel
Change the mode associated with the transform set.
The mode setting is only applicable to traffic whose
source and destination addresses are the IPSec peer
addresses; it is ignored for all other traffic. (All other
traffic is in tunnel mode only.) This example
configures tunnel mode for the transport set proposal4,
which creates an IPSec tunnel between the IPSec peer
addresses.
3
hq-sanjose(cfg-crypto-trans)# exit
hq-sanjose(config)#
Exit back to global configuration mode.
1 AH = authentication header. This header, when added to an IP datagram, ensures the integrity and authenticity of the data, including
the invariant fields in the outer IP header. It does not provide confidentiality protection. AH uses a keyed-hash function rather than
digital signatures.
2 ESP = encapsulating security payload. This header, when added to an IP datagram, protects the confidentiality, integrity, and
authenticity of the data. If ESP is used to validate data integrity, it does not include the invariant fields in the IP header.
Step Command Purpose
Seitenansicht 85
1 2 ... 81 82 83 84 85 86 87 88 89 90 91 ... 111 112

Kommentare zu diesen Handbüchern

Keine Kommentare