Software Guide
Page 70
... through AAA, beginning in multiple transform sets for a transform that is selected and applied to use a particular transform set for protecting data flow. For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. Example: Router(config)# aaa new-model Router(config)# Step 2 Step 3 Step 4 aaa authentication login {default...
... through AAA, beginning in multiple transform sets for a transform that is selected and applied to use a particular transform set for protecting data flow. For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. Example: Router(config)# aaa new-model Router(config)# Step 2 Step 3 Step 4 aaa authentication login {default...
Software Guide
Page 81
...remote local Router(config)# This example uses a local authorization database. You could also use a particular transform set for protecting data flow. This example implements a username of cisco with an encrypted password of all level | reverse-access | configuration} {default | network-related service requests, including... these steps to enable policy lookup through AAA, beginning in multiple transform sets for a transform that is selected and applied to the protected traffic as a part of both peers. Example: Router(config)# aaa new-model Router(config)# Step 2 Step 3 Step 4 aaa...
...remote local Router(config)# This example uses a local authorization database. You could also use a particular transform set for protecting data flow. This example implements a username of cisco with an encrypted password of all level | reverse-access | configuration} {default | network-related service requests, including... these steps to enable policy lookup through AAA, beginning in multiple transform sets for a transform that is selected and applied to the protected traffic as a part of both peers. Example: Router(config)# aaa new-model Router(config)# Step 2 Step 3 Step 4 aaa...
Software Guide
Page 90
... 121781 1 1 Multiple networked devices-Desktops, laptop PCs, switches 2 Fast Ethernet LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco Secure Router 520 Series router 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside WAN interface (FE4) and... protects the Fast Ethernet LAN on FE0 by filtering and inspecting all traffic entering the router on page 8-5. Figure 8-1 Router with...
... 121781 1 1 Multiple networked devices-Desktops, laptop PCs, switches 2 Fast Ethernet LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco Secure Router 520 Series router 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside WAN interface (FE4) and... protects the Fast Ethernet LAN on FE0 by filtering and inspecting all traffic entering the router on page 8-5. Figure 8-1 Router with...
Software Guide
Page 96
... using 802.1x authentication (such as Light Extensible Authentication Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point when you have also configured DHCP, VLANs, and secure tunnels. Configure ...router. Specifies the time interval, in the "Configuration Example" section on bridges. See the Cisco IOS Commands for Access Points and Bridges for more details. Cisco Secure Router 520 Series Software Configuration Guide 9-2 OL-14210-01 If you enable broadcast key ...
... using 802.1x authentication (such as Light Extensible Authentication Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point when you have also configured DHCP, VLANs, and secure tunnels. Configure ...router. Specifies the time interval, in the "Configuration Example" section on bridges. See the Cisco IOS Commands for Access Points and Bridges for more details. Cisco Secure Router 520 Series Software Configuration Guide 9-2 OL-14210-01 If you enable broadcast key ...
Software Guide
Page 110
... router, scanning each to the connected network. 11-4 Cisco Secure Router 520 Series Software Configuration Guide OL-14210-01 Configuring Cisco IOS Firewall IDS Chapter 11 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco Secure Router 520 Series routers, see the EZVPN...
... router, scanning each to the connected network. 11-4 Cisco Secure Router 520 Series Software Configuration Guide OL-14210-01 Configuring Cisco IOS Firewall IDS Chapter 11 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco Secure Router 520 Series routers, see the EZVPN...
Software Guide
Page 127
...Enter the interface command (with a password as described in "Enable Secret Passwords and Enable Passwords" later in this mode should be protected with a specific interface, such as a whole. and serial interfaces or • To exit to your router configuration, access to ...unauthorized changes to your exit or end command, or router as interface atm 0) from privileged EXEC mode. press Ctrl-Z. Appendix A Cisco IOS Software Basic Skills Understanding Command Modes Table A-2 Command Modes Summary Mode User EXEC Access Method Begin a session with the interface...
...Enter the interface command (with a password as described in "Enable Secret Passwords and Enable Passwords" later in this mode should be protected with a specific interface, such as a whole. and serial interfaces or • To exit to your router configuration, access to ...unauthorized changes to your exit or end command, or router as interface atm 0) from privileged EXEC mode. press Ctrl-Z. Appendix A Cisco IOS Software Basic Skills Understanding Command Modes Table A-2 Command Modes Summary Mode User EXEC Access Method Begin a session with the interface...
Software Guide
Page 128
...exit to press the Up Arrow key for the terminal line. To redisplay a command you should password-protect these commands to help you enter commands. Cisco Secure Router 520 Series Software Configuration Guide A-4 OL-14210-01 clock Display the system clock dialer Dialer ... the router ships without password protection. To complete a command, enter a few known characters followed by a question mark (with the desired line number and optional line type, for example router rip, from global configuration mode. Getting Help Appendix A Cisco IOS Software Basic Skills Table ...
...exit to press the Up Arrow key for the terminal line. To redisplay a command you should password-protect these commands to help you enter commands. Cisco Secure Router 520 Series Software Configuration Guide A-4 OL-14210-01 clock Display the system clock dialer Dialer ... the router ships without password protection. To complete a command, enter a few known characters followed by a question mark (with the desired line number and optional line type, for example router rip, from global configuration mode. Getting Help Appendix A Cisco IOS Software Basic Skills Table ...
Software Guide
Page 135
...has the following characteristics: • The authentication process uses a variable challenge value rather than a password. • CHAP protects against its own calculation of IP addresses, asynchronous (start/stop) and bit-oriented synchronous encapsulation, network protocol multiplexing, link ...accepts the authentication. Repeated challenges limit the time of PPP supports two security authentication protocols to a corporate office Cisco router. Appendix B Concepts PPP Authentication Protocols PPP Authentication Protocols The Point-to-Point Protocol (PPP) encapsulates network ...
...has the following characteristics: • The authentication process uses a variable challenge value rather than a password. • CHAP protects against its own calculation of IP addresses, asynchronous (start/stop) and bit-oriented synchronous encapsulation, network protocol multiplexing, link ...accepts the authentication. Repeated challenges limit the time of PPP supports two security authentication protocols to a corporate office Cisco router. Appendix B Concepts PPP Authentication Protocols PPP Authentication Protocols The Point-to-Point Protocol (PPP) encapsulates network ...
Software Guide
Page 159
...overloading, defined B-6 OL-14210-01 Index P packets, ATM, displaying 12-7 PAP B-3 parameters, setting up global 1-4 Password Authentication Protocol See PAP password protection A-4 passwords recovery 12-9 to 12-12 resetting 12-11 setting A-4 permanent virtual circuit See PVC permit command B-9 ping atm interface command 12-2 Point...PPPoE client 3-1 configuration example 3-8 configuring 3-1 verifying your configuration 3-8 prerequisites, for configuration 1-2 privileged EXEC commands, accessing A-5 privileged EXEC mode A-2, A-3 Cisco Secure Router 520 Series Software Configuration Guide IN-5
...overloading, defined B-6 OL-14210-01 Index P packets, ATM, displaying 12-7 PAP B-3 parameters, setting up global 1-4 Password Authentication Protocol See PAP password protection A-4 passwords recovery 12-9 to 12-12 resetting 12-11 setting A-4 permanent virtual circuit See PVC permit command B-9 ping atm interface command 12-2 Point...PPPoE client 3-1 configuration example 3-8 configuring 3-1 verifying your configuration 3-8 prerequisites, for configuration 1-2 privileged EXEC commands, accessing A-5 privileged EXEC mode A-2, A-3 Cisco Secure Router 520 Series Software Configuration Guide IN-5