Configuration Guide
Page 73
...Router(config)# username Cisco password 0 Cisco Router(config)# Establishes a username-based authentication system. During IKE negotiations, the peers search in multiple transform sets for a transform that is selected and applied to use a RADIUS server for protecting data flow. Configure IPSec Transforms and Protocols A transform set represents a certain combination of security...For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 6-7 This ...
...Router(config)# username Cisco password 0 Cisco Router(config)# Establishes a username-based authentication system. During IKE negotiations, the peers search in multiple transform sets for a transform that is selected and applied to use a RADIUS server for protecting data flow. Configure IPSec Transforms and Protocols A transform set represents a certain combination of security...For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 6-7 This ...
Configuration Guide
Page 83
... for protecting data flow. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 7-5 Example: Router(config)# aaa authentication login rtr-remote local Router(config)# This example uses a local authentication database. aaa authorization {network | exec | commands Specifies AAA authorization of both peers. See the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command...
... for protecting data flow. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 7-5 Example: Router(config)# aaa authentication login rtr-remote local Router(config)# This example uses a local authentication database. aaa authorization {network | exec | commands Specifies AAA authorization of both peers. See the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command...
Configuration Guide
Page 92
...LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco 851/871 or Cisco 857/876/877/878 series access router, respectively 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside interface for... A configuration example that you have also configured DHCP, VLANs, and secure tunnels. You may have not performed these configuration tasks is not filtered. Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 8-2 OL-5332-01 Note that in this network ...
...LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco 851/871 or Cisco 857/876/877/878 series access router, respectively 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside interface for... A configuration example that you have also configured DHCP, VLANs, and secure tunnels. You may have not performed these configuration tasks is not filtered. Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 8-2 OL-5332-01 Note that in this network ...
Configuration Guide
Page 98
... Router(config)# interface dot11radio 0 Router(config-if)# Step 2 broadcast-key [vlan vlan-id] change seconds Example: Router(config-if)# broadcast-key vlan 1 change 45 Router(config-if)# Purpose Enters interface configuration mode for more details. Cisco 850 Series and Cisco 870 Series Access Routers ... point when you have already configured basic router features as well as PPPoE or PPPoA with NAT," as Light Extensible Authentication Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use ...
... Router(config)# interface dot11radio 0 Router(config-if)# Step 2 broadcast-key [vlan vlan-id] change seconds Example: Router(config-if)# broadcast-key vlan 1 change 45 Router(config-if)# Purpose Enters interface configuration mode for more details. Cisco 850 Series and Cisco 870 Series Access Routers ... point when you have already configured basic router features as well as PPPoE or PPPoA with NAT," as Light Extensible Authentication Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use ...
Configuration Guide
Page 118
... Firewall IDS, see the "Configuring IPSec Network Security" chapter of how to configure your router with these features. Configuring Cisco IOS Firewall IDS Chapter 12 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco 850 and Cisco 870 series access routers, see the following feature documents: •...
... Firewall IDS, see the "Configuring IPSec Network Security" chapter of how to configure your router with these features. Configuring Cisco IOS Firewall IDS Chapter 12 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco 850 and Cisco 870 series access routers, see the following feature documents: •...
Configuration Guide
Page 119
.... therefore, both ports cannot be activated simultaneously, and the command-line interface (CLI) must be used to configure a backup modem line connection, the Cisco 800 series access routers provide protection against WAN downtime. Dial backup is inactive by default, and must be configured to activate the dial backup feature: • Backup Interfaces •...
.... therefore, both ports cannot be activated simultaneously, and the command-line interface (CLI) must be used to configure a backup modem line connection, the Cisco 800 series access routers provide protection against WAN downtime. Dial backup is inactive by default, and must be configured to activate the dial backup feature: • Backup Interfaces •...
Configuration Guide
Page 159
...these tasks: mode, enter the disable • Configure your exit or end command, or router as a whole. press Ctrl-Z. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide A-3 EXEC mode, enter the end command, or press Ctrl-Z. •... the parameters that apply to your router command. Appendix A Cisco IOS Software Basic Skills Understanding Command Modes Table A-2 Command Modes Summary Mode User EXEC Access Method Begin a session with your router configuration, access to this mode should be protected with a password as described in...
...these tasks: mode, enter the disable • Configure your exit or end command, or router as a whole. press Ctrl-Z. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide A-3 EXEC mode, enter the end command, or press Ctrl-Z. •... the parameters that apply to your router command. Appendix A Cisco IOS Software Basic Skills Understanding Command Modes Table A-2 Command Modes Summary Mode User EXEC Access Method Begin a session with your router configuration, access to this mode should be protected with a password as described in...
Configuration Guide
Page 161
... it . You can now make changes to your router console port. Appendix A Cisco IOS Software Basic Skills Enable Secret Passwords and Enable Passwords Enable Secret Passwords and Enable Passwords By default, the router ships without password protection. The enable secret password is thus unencrypted. For maximum security, the passwords should be different. trailing spaces are...
... it . You can now make changes to your router console port. Appendix A Cisco IOS Software Basic Skills Enable Secret Passwords and Enable Passwords Enable Secret Passwords and Enable Passwords By default, the router ships without password protection. The enable secret password is thus unencrypted. For maximum security, the passwords should be different. trailing spaces are...
Configuration Guide
Page 168
...Repeated challenges limit the time of the two protocols. After the PPP link is the more secure of exposure to a corporate office Cisco router. If the values match, the corporate office router accepts the authentication. CHAP has the following characteristics: • The password portion of the ...imagine a network topology in clear text (not scrambled or encrypted). • PAP provides no protection from playback or repeated trial-and-error attacks. • The remote office router controls the frequency and timing of the authentication is connected to any time after the link is...
...Repeated challenges limit the time of the two protocols. After the PPP link is the more secure of exposure to a corporate office Cisco router. If the values match, the corporate office router accepts the authentication. CHAP has the following characteristics: • The password portion of the ...imagine a network topology in clear text (not scrambled or encrypted). • PAP provides no protection from playback or repeated trial-and-error attacks. • The remote office router controls the frequency and timing of the authentication is connected to any time after the link is...
Configuration Guide
Page 170
... and applied dynamically as a Basic Rate Interface (BRI), or an assigned backup dialer interface to be configured independently of the router in Cisco IOS software: • Backup Interface • Floating Static Routes • Dialer Watch Backup Interface A backup interface is activated...backup provides protection against WAN downtime by the ATM adaptation layer (AAL) and the encapsulation type. A PVC is created are used in a particular protocol header. The characteristics of ATM PVC encapsulation. Cisco routers support the AAL5 format, which the router communicates. ...
... and applied dynamically as a Basic Rate Interface (BRI), or an assigned backup dialer interface to be configured independently of the router in Cisco IOS software: • Backup Interface • Floating Static Routes • Dialer Watch Backup Interface A backup interface is activated...backup provides protection against WAN downtime by the ATM adaptation layer (AAL) and the encapsulation type. A PVC is created are used in a particular protocol header. The characteristics of ATM PVC encapsulation. Cisco routers support the AAL5 format, which the router communicates. ...
Configuration Guide
Page 194
Index P packets, ATM, displaying 8 PAP 4 parameters, setting up global 5 Password Authentication Protocol See PAP password protection 5 passwords recovery 9 to 12 resetting 12 setting 5 permanent virtual circuit See PVC permit command 11 ping atm interface command 3 ... subinterfaces, configuring 6 related documents 14 remote access VPN 1 remote management, configuring 9, 16 reset command 3 resetting configuration register value 12 passwords 12 router 11 to 12 RIP configuring 13 overview 2 to 3 ROM monitor commands 2 to 3 debug commands 8, 9 entering 1 exiting 10 root radio station, configuring...
Index P packets, ATM, displaying 8 PAP 4 parameters, setting up global 5 Password Authentication Protocol See PAP password protection 5 passwords recovery 9 to 12 resetting 12 setting 5 permanent virtual circuit See PVC permit command 11 ping atm interface command 3 ... subinterfaces, configuring 6 related documents 14 remote access VPN 1 remote management, configuring 9, 16 reset command 3 resetting configuration register value 12 passwords 12 router 11 to 12 RIP configuring 13 overview 2 to 3 ROM monitor commands 2 to 3 debug commands 8, 9 entering 1 exiting 10 root radio station, configuring...