Configuration Guide
Page 73
... and algorithms. During IKE negotiation, the peers agree to the protected traffic as a part of both peers. For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. Example: Router(config)# aaa authorization network rtr-remote local Router(config)# This example uses a local authorization database. During IKE negotiations, the peers search in multiple...
... and algorithms. During IKE negotiation, the peers agree to the protected traffic as a part of both peers. For details, see the Cisco IOS Security Configuration Guide and Cisco IOS Security Command Reference. Example: Router(config)# aaa authorization network rtr-remote local Router(config)# This example uses a local authorization database. During IKE negotiations, the peers search in multiple...
Configuration Guide
Page 83
... steps to the protected traffic as a part of both peers. Example: Router(config)# aaa new-model Router(config)# Step 2 Step 3 Step 4 aaa authentication login {default | list-name} Specifies AAA authentication of security protocols and algorithms. During IKE negotiation, the peers agree to do so. See the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command Reference...
... steps to the protected traffic as a part of both peers. Example: Router(config)# aaa new-model Router(config)# Step 2 Step 3 Step 4 aaa authentication login {default | list-name} Specifies AAA authentication of security protocols and algorithms. During IKE negotiation, the peers agree to do so. See the Cisco IOS Security Configuration Guide and the Cisco IOS Security Command Reference...
Configuration Guide
Page 92
... LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco 851/871 or Cisco 857/876/877/878 series access router, respectively 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside WAN interface (FE4...) on the Cisco 851 or Cisco 871 and protects the Fast Ethernet LAN on FE0 by filtering and inspecting all traffic entering the router on page 8-5. Note that you have also configured DHCP, VLANs, and secure tunnels. Configuration Tasks Perform the following...
... LAN interface (the inside interface for NAT) 3 PPPoE or PPPoA client and firewall implementation-Cisco 851/871 or Cisco 857/876/877/878 series access router, respectively 4 Point at which NAT occurs 5 Protected network 6 Unprotected network 7 Fast Ethernet or ATM WAN interface (the outside WAN interface (FE4...) on the Cisco 851 or Cisco 871 and protects the Fast Ethernet LAN on FE0 by filtering and inspecting all traffic entering the router on page 8-5. Note that you have also configured DHCP, VLANs, and secure tunnels. Configuration Tasks Perform the following...
Configuration Guide
Page 98
...the radio interface. Specifies the time interval, in the "Configuration Example" section on bridges. Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 9-2 OL-5332-01 Note This command is provided in seconds, between rotations ... Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point when you have not performed these configurations tasks, see Chapter 1, "Basic Router Configuration," Chapter 3, "Configuring PPP over Ethernet with...
...the radio interface. Specifies the time interval, in the "Configuration Example" section on bridges. Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 9-2 OL-5332-01 Note This command is provided in seconds, between rotations ... Protocol [LEAP], Extensible Authentication Protocol-Transport Layer Security [EAP-TLS], or Protected Extensible Authentication Protocol [PEAP]) can use the access point when you have not performed these configurations tasks, see Chapter 1, "Basic Router Configuration," Chapter 3, "Configuring PPP over Ethernet with...
Configuration Guide
Page 118
... alarm, drops suspicious packets, or resets the TCP connection. Configuring Cisco IOS Firewall IDS Chapter 12 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco 850 and Cisco 870 series access routers, see the "Configuring Cisco IOS Firewall Intrusion Detection System" section of the most common...
... alarm, drops suspicious packets, or resets the TCP connection. Configuring Cisco IOS Firewall IDS Chapter 12 Configuring Security Features Configuring Cisco IOS Firewall IDS Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection by Cisco 850 and Cisco 870 series access routers, see the "Configuring Cisco IOS Firewall Intrusion Detection System" section of the most common...
Configuration Guide
Page 119
...be configured as follows: • Through the auxiliary port on any Cisco 850 or Cisco 870 series router • Through the ISDN S/T port on the Cisco 876 and Cisco 878 routers Note The console port and the auxiliary port in (for remote ...Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 13-1 13 C H A P T E R Configuring Dial Backup and Remote Management The Cisco 800 series access routers support dial-in the Cisco IOS software configuration are available to configure a backup modem line connection, the Cisco 800 series access routers provide protection...
...be configured as follows: • Through the auxiliary port on any Cisco 850 or Cisco 870 series router • Through the ISDN S/T port on the Cisco 876 and Cisco 878 routers Note The console port and the auxiliary port in (for remote ...Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide 13-1 13 C H A P T E R Configuring Dial Backup and Remote Management The Cisco 800 series access routers support dial-in the Cisco IOS software configuration are available to configure a backup modem line connection, the Cisco 800 series access routers provide protection...
Configuration Guide
Page 159
... configuration Enter the configure command from user EXEC mode. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide A-3 command. To prevent unauthorized changes to your router configuration, access to this mode should be protected with your router. Router (config)# Interface configuration Enter the interface command (with the interface command. EXEC mode...
... configuration Enter the configure command from user EXEC mode. OL-5332-01 Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide A-3 command. To prevent unauthorized changes to your router configuration, access to this mode should be protected with your router. Router (config)# Interface configuration Enter the interface command (with the interface command. EXEC mode...
Configuration Guide
Page 161
...; enable password-A less secure, unencrypted local password Both the enable and enable secret passwords control access to various privilege levels (0 to your router console port. Appendix A Cisco IOS Software Basic Skills Enable Secret Passwords and Enable Passwords Enable Secret Passwords and Enable Passwords By default, the router ships without password protection. trailing spaces are also...
...; enable password-A less secure, unencrypted local password Both the enable and enable secret passwords control access to various privilege levels (0 to your router console port. Appendix A Cisco IOS Software Basic Skills Enable Secret Passwords and Enable Passwords Enable Secret Passwords and Enable Passwords By default, the router ships without password protection. trailing spaces are also...
Configuration Guide
Page 168
...8226; PAP provides no protection from playback or repeated trial-and-error attacks. • The remote office router controls the frequency and timing of the variable challenge value, which remote routers are connected to it is the more secure of Network Control Protocols ... a network topology in which a remote office Cisco router is established, the remote office router repeatedly sends a configured username and password until the corporate office router accepts the authentication. Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide B-4 OL-5332-01 After ...
...8226; PAP provides no protection from playback or repeated trial-and-error attacks. • The remote office router controls the frequency and timing of the variable challenge value, which remote routers are connected to it is the more secure of Network Control Protocols ... a network topology in which a remote office Cisco router is established, the remote office router repeatedly sends a configured username and password until the corporate office router accepts the authentication. Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide B-4 OL-5332-01 After ...
Configuration Guide
Page 170
...backup modem line connection. While the primary Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide B-6 OL-5332-01 Cisco routers support the AAL5 format, which the router communicates. Dialer interfaces can be configured independently of the router in a particular protocol header. The backup... VC-MUX (RFC 1483) • PPP (RFC 2364) Each PVC is a connection between remote hosts and routers. Dial Backup Dial backup provides protection against WAN downtime by the ATM adaptation layer (AAL) and the encapsulation type. The type of the data.
...backup modem line connection. While the primary Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide B-6 OL-5332-01 Cisco routers support the AAL5 format, which the router communicates. Dialer interfaces can be configured independently of the router in a particular protocol header. The backup... VC-MUX (RFC 1483) • PPP (RFC 2364) Each PVC is a connection between remote hosts and routers. Dial Backup Dial backup provides protection against WAN downtime by the ATM adaptation layer (AAL) and the encapsulation type. The type of the data.
Configuration Guide
Page 194
Index P packets, ATM, displaying 8 PAP 4 parameters, setting up global 5 Password Authentication Protocol See PAP password protection 5 passwords recovery 9 to 12 resetting 12 setting 5 permanent virtual circuit See PVC permit command 11 ping atm interface command 3 ... subinterfaces, configuring 6 related documents 14 remote access VPN 1 remote management, configuring 9, 16 reset command 3 resetting configuration register value 12 passwords 12 router 11 to 12 RIP configuring 13 overview 2 to 3 ROM monitor commands 2 to 3 debug commands 8, 9 entering 1 exiting 10 root radio station, configuring...
Index P packets, ATM, displaying 8 PAP 4 parameters, setting up global 5 Password Authentication Protocol See PAP password protection 5 passwords recovery 9 to 12 resetting 12 setting 5 permanent virtual circuit See PVC permit command 11 ping atm interface command 3 ... subinterfaces, configuring 6 related documents 14 remote access VPN 1 remote management, configuring 9, 16 reset command 3 resetting configuration register value 12 passwords 12 router 11 to 12 RIP configuring 13 overview 2 to 3 ROM monitor commands 2 to 3 debug commands 8, 9 entering 1 exiting 10 root radio station, configuring...