Software Guide
Page 70
...protecting data flow. username name {nopassword | password password | password encryption-type encrypted-password} Example: Router(config)# username Cisco password 0 Cisco Router(config)# Establishes a username-based authentication system. When such a transform set is found, it is the same at method1 [method2...] login, and specifies the method used. Cisco...lookup through AAA, beginning in multiple transform sets for a transform that is selected and applied to the protected traffic as a part of both peers. Example: Router(config)# aaa authentication login rtr-remote local Router...
...protecting data flow. username name {nopassword | password password | password encryption-type encrypted-password} Example: Router(config)# username Cisco password 0 Cisco Router(config)# Establishes a username-based authentication system. When such a transform set is found, it is the same at method1 [method2...] login, and specifies the method used. Cisco...lookup through AAA, beginning in multiple transform sets for a transform that is selected and applied to the protected traffic as a part of both peers. Example: Router(config)# aaa authentication login rtr-remote local Router...
Software Guide
Page 81
... AAA, beginning in multiple transform sets for details. See the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command Reference for a transform that is selected and applied to the protected traffic as a part of all level | reverse-access | ...remote local Router(config)# This example uses a local authorization database. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide 7-5 You could also use a RADIUS server for protecting data flow. username name {nopassword | password password | password encryption-type encrypted-...
... AAA, beginning in multiple transform sets for details. See the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command Reference for a transform that is selected and applied to the protected traffic as a part of all level | reverse-access | ...remote local Router(config)# This example uses a local authorization database. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide 7-5 You could also use a RADIUS server for protecting data flow. username name {nopassword | password password | password encryption-type encrypted-...
Software Guide
Page 90
...Configure Access Lists • Configure Inspection Rules • Apply Access Lists and Inspection Rules to the outside WAN interface (FE4) and protects the Fast Ethernet LAN on FE0 by filtering and inspecting all traffic entering the router on page 8-5. Chapter 8 Configuring a Simple Firewall ... Fast Ethernet LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco Secure Router 520 Series router 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside interface for NAT) In...
...Configure Access Lists • Configure Inspection Rules • Apply Access Lists and Inspection Rules to the outside WAN interface (FE4) and protects the Fast Ethernet LAN on FE0 by filtering and inspecting all traffic entering the router on page 8-5. Chapter 8 Configuring a Simple Firewall ... Fast Ethernet LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco Secure Router 520 Series router 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside interface for NAT) In...
Software Guide
Page 96
...PPP over ATM with NAT. Configure the Root Radio Station Perform these configuration tasks is not supported on page 9-6. See the Cisco IOS Commands for Access Points and Bridges for clients. You may have already configured basic router features as well as PPPoE or... [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point when you have also configured DHCP, VLANs, and secure tunnels. Cisco Secure Router 520 Series Software Configuration Guide 9-2 OL-14210-01 Configure the...
...PPP over ATM with NAT. Configure the Root Radio Station Perform these configuration tasks is not supported on page 9-6. See the Cisco IOS Commands for Access Points and Bridges for clients. You may have already configured basic router features as well as PPPoE or... [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point when you have also configured DHCP, VLANs, and secure tunnels. Cisco Secure Router 520 Series Software Configuration Guide 9-2 OL-14210-01 Configure the...
Software Guide
Page 110
... of the most common attacks using IP security (IPsec) tunnels and generic routing encapsulation (GRE). Configuring Cisco IOS Firewall IDS Chapter 11 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco Secure Router 520 Series routers, see the EZVPN Server feature document...
... of the most common attacks using IP security (IPsec) tunnels and generic routing encapsulation (GRE). Configuring Cisco IOS Firewall IDS Chapter 11 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco Secure Router 520 Series routers, see the EZVPN Server feature document...
Software Guide
Page 127
...for the router Ethernet enter the exit command. To prevent unauthorized changes to your router configuration, access to this mode should be protected with a password as described in "Enable Secret Passwords and Enable Passwords" later in configuration mode, this table: enter the ...exit to privileged subinterfaces. Prompt Router> Privileged EXEC Enter the enable command from privileged EXEC mode. press Ctrl-Z. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide A-3 and serial interfaces or • To exit to user EXEC Use this guide. ...
...for the router Ethernet enter the exit command. To prevent unauthorized changes to your router configuration, access to this mode should be protected with a password as described in "Enable Secret Passwords and Enable Passwords" later in configuration mode, this table: enter the ...exit to privileged subinterfaces. Prompt Router> Privileged EXEC Enter the enable command from privileged EXEC mode. press Ctrl-Z. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide A-3 and serial interfaces or • To exit to user EXEC Use this guide. ...
Software Guide
Page 128
...OL-14210-01 clock Display the system clock dialer Dialer parameters and statistics exception exception information ... Getting Help Appendix A Cisco IOS Software Basic Skills Table A-2 Command Modes Summary (continued) Mode Router configuration Access Method Prompt Enter one of ... (configrouter)# Line configuration Enter the line command with no space): Router> s? * s=show set operating parameters, you should password-protect these commands to help you previously entered, press the Up Arrow key. Getting Help You can continue to privileged EXEC mode, enter...
...OL-14210-01 clock Display the system clock dialer Dialer parameters and statistics exception exception information ... Getting Help Appendix A Cisco IOS Software Basic Skills Table A-2 Command Modes Summary (continued) Mode Router configuration Access Method Prompt Enter one of ... (configrouter)# Line configuration Enter the line command with no space): Router> s? * s=show set operating parameters, you should password-protect these commands to help you previously entered, press the Up Arrow key. Getting Help You can continue to privileged EXEC mode, enter...
Software Guide
Page 135
... Authentication Protocol (PAP) • Challenge Handshake Authentication Protocol (CHAP) PPP with a variable value. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide B-3 PPP originally emerged as network-layer address negotiation and data-compression negotiation. The...the following characteristics: • The authentication process uses a variable challenge value rather than a password. • CHAP protects against its own calculation of the authentication attempts. Appendix B Concepts PPP Authentication Protocols PPP Authentication Protocols The Point-to-...
... Authentication Protocol (PAP) • Challenge Handshake Authentication Protocol (CHAP) PPP with a variable value. OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide B-3 PPP originally emerged as network-layer address negotiation and data-compression negotiation. The...the following characteristics: • The authentication process uses a variable challenge value rather than a password. • CHAP protects against its own calculation of the authentication attempts. Appendix B Concepts PPP Authentication Protocols PPP Authentication Protocols The Point-to-...
Software Guide
Page 159
...overloading, defined B-6 OL-14210-01 Index P packets, ATM, displaying 12-7 PAP B-3 parameters, setting up global 1-4 Password Authentication Protocol See PAP password protection A-4 passwords recovery 12-9 to 12-12 resetting 12-11 setting A-4 permanent virtual circuit See PVC permit command B-9 ping atm interface command 12-2 Point...PPPoE client 3-1 configuration example 3-8 configuring 3-1 verifying your configuration 3-8 prerequisites, for configuration 1-2 privileged EXEC commands, accessing A-5 privileged EXEC mode A-2, A-3 Cisco Secure Router 520 Series Software Configuration Guide IN-5
...overloading, defined B-6 OL-14210-01 Index P packets, ATM, displaying 12-7 PAP B-3 parameters, setting up global 1-4 Password Authentication Protocol See PAP password protection A-4 passwords recovery 12-9 to 12-12 resetting 12-11 setting A-4 permanent virtual circuit See PVC permit command B-9 ping atm interface command 12-2 Point...PPPoE client 3-1 configuration example 3-8 configuring 3-1 verifying your configuration 3-8 prerequisites, for configuration 1-2 privileged EXEC commands, accessing A-5 privileged EXEC mode A-2, A-3 Cisco Secure Router 520 Series Software Configuration Guide IN-5