Foreword |
|
xxi | |
Introduction |
|
xxiii | |
|
|
3 | (36) |
|
|
4 | (12) |
|
|
5 | (1) |
|
|
6 | (4) |
|
Circuit-Switched Connections |
|
|
10 | (1) |
|
Asynchronous Dialup Connections |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (1) |
|
Selecting Appropriate WAN Technologies |
|
|
16 | (6) |
|
Choosing a WAN Connections |
|
|
16 | (2) |
|
Identifying Site Requirements and Solutions |
|
|
18 | (1) |
|
Central Site Considerations |
|
|
18 | (1) |
|
Branch Office Considerations |
|
|
19 | (2) |
|
Telecommuter Site Considerations |
|
|
21 | (1) |
|
Selecting Cisco Remote-Access Solutions |
|
|
22 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Selecting Site-Specific WAN Components |
|
|
24 | (8) |
|
|
24 | (1) |
|
Central Site Router Equipment |
|
|
25 | (3) |
|
Branch Office Router Equipment |
|
|
28 | (3) |
|
Telecommuter Site Router Equipment |
|
|
31 | (1) |
|
Basic Router Configuration Lab Exercises |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (4) |
|
Moderns and Asynchronous Dialup Connections |
|
|
39 | (58) |
|
|
39 | (19) |
|
Digital-to-Analog Conversion |
|
|
40 | (1) |
|
|
41 | (1) |
|
Modem Signaling and Cabling |
|
|
42 | (2) |
|
The EIA/TIA-232-C Standard |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
DTE Communication Termination |
|
|
47 | (1) |
|
|
48 | (2) |
|
Connecting a Modem to a Router |
|
|
50 | (1) |
|
Connecting to the AUX Port |
|
|
51 | (1) |
|
Connecting to the Console Port |
|
|
51 | (1) |
|
Connecting to a Serial Interface |
|
|
51 | (1) |
|
Connecting a Modem to an Access Server---Async Lines |
|
|
52 | (1) |
|
Connecting a Modem to a PC |
|
|
52 | (1) |
|
Directly Connecting a DTE to Another DTE---Null Modem Cable |
|
|
53 | (2) |
|
Modem Modulation Standards |
|
|
55 | (1) |
|
Error Control and Data Compression |
|
|
56 | (2) |
|
Configuring Asynchronous Interfaces and Terminal Lines |
|
|
58 | (19) |
|
Connecting to the Modem---Reverse Telnet |
|
|
58 | (3) |
|
|
61 | (4) |
|
Configuring Reverse Telnet |
|
|
65 | (2) |
|
Asynchronous Interfaces and Line Configuration |
|
|
67 | (2) |
|
Basic Terminal Line Configuration |
|
|
69 | (2) |
|
Basic Auxiliary Port Configuration |
|
|
71 | (1) |
|
Configurating the Console Port to Use a Modem |
|
|
72 | (1) |
|
Configuring a Serial Interface to Use a Modem |
|
|
73 | (1) |
|
Configuring Asynchronous Interfaces |
|
|
73 | (1) |
|
Asynchronous Interface Configuration Example |
|
|
74 | (2) |
|
Introduction to DDR---Dialer List |
|
|
76 | (1) |
|
|
77 | (11) |
|
Modem Configuration Methods |
|
|
78 | (1) |
|
Manual Configuration of Modems with Standard Commands |
|
|
79 | (1) |
|
Manual Configuration of Modems with Nonstandard Modem Commands |
|
|
80 | (1) |
|
Modem Initialization Strings |
|
|
81 | (1) |
|
Automatic Configuration of Modems |
|
|
81 | (1) |
|
Modem Capability Database |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
Fine-Tuning Modem Autoconfiguration |
|
|
84 | (1) |
|
Chat Scripts for Async Lines |
|
|
85 | (1) |
|
Configuring Asynchronous Connections Between Remote Routers |
|
|
86 | (2) |
|
Verifying Modem Configuration |
|
|
88 | (2) |
|
Verifying and Debugging Modem Autoconfiguration |
|
|
89 | (1) |
|
Troubleshooting Modem Autoconfiguration |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (5) |
|
|
97 | (42) |
|
|
97 | (12) |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
Dialup PPP versus Dialup EXEC Sessions |
|
|
101 | (1) |
|
Synchronous PPP Connection |
|
|
102 | (1) |
|
Asynchronous PPP Connection |
|
|
102 | (1) |
|
Configuring Dedicated PPP Sessions |
|
|
103 | (1) |
|
Configuring Interactive PPP Sessions |
|
|
103 | (3) |
|
Configuring the Interface Addressing Method for Local Devices |
|
|
106 | (1) |
|
Configuring the Interface Addressing Method for Remote Devices |
|
|
107 | (1) |
|
|
107 | (2) |
|
|
109 | (6) |
|
PAP and CHAP Authentication |
|
|
109 | (1) |
|
PAP Is Not as Secure as CHAP |
|
|
109 | (2) |
|
Configuring PAP Authentication |
|
|
111 | (2) |
|
Configuring CHAP Authentication |
|
|
113 | (1) |
|
Configuring CHAP and PAP Authentication |
|
|
114 | (1) |
|
|
115 | (6) |
|
Dialup PPP Callback Overview |
|
|
115 | (1) |
|
|
115 | (3) |
|
Configuring the Callback Server |
|
|
118 | (2) |
|
Configuring the Callback Client |
|
|
120 | (1) |
|
|
121 | (4) |
|
|
121 | (2) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Interpreting the show compress Output |
|
|
124 | (1) |
|
|
125 | (3) |
|
|
125 | (1) |
|
MLP Operation and Configuration |
|
|
126 | (1) |
|
|
127 | (1) |
|
Verifying PPP Configuration |
|
|
128 | (4) |
|
Verifying and Troubleshooting PPP |
|
|
129 | (1) |
|
PPP Configuration Example |
|
|
130 | (2) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (6) |
|
|
139 | (64) |
|
|
140 | (10) |
|
ISDN versus Asynchronous Dialup |
|
|
140 | (1) |
|
ISDN Services and Channelized El and Tl |
|
|
141 | (2) |
|
|
143 | (1) |
|
BRI Functional Groups and Reference Points |
|
|
144 | (2) |
|
Physical Representation of BRI Reference Points |
|
|
146 | (3) |
|
|
149 | (1) |
|
|
150 | (5) |
|
|
150 | (1) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (5) |
|
ISDN BRI Configuration Overview |
|
|
155 | (1) |
|
Configuring the ISDN Switch Type |
|
|
156 | (1) |
|
|
157 | (2) |
|
Configuring the Encapsulation Protocol |
|
|
159 | (1) |
|
Configuring Dial-on-Demand Routing (DDR) |
|
|
160 | (5) |
|
DDR Configuration Overview |
|
|
160 | (1) |
|
Defining Interesting Traffic |
|
|
160 | (2) |
|
Assigning the Dialer List to an Interface |
|
|
162 | (1) |
|
Defining Destination Parameters |
|
|
162 | (1) |
|
Defining Optional Call Parameters |
|
|
163 | (2) |
|
Static and Default Routing |
|
|
165 | (10) |
|
Use of Static and Default Routes |
|
|
165 | (1) |
|
Configuring Static Routes |
|
|
166 | (1) |
|
Configuring Default Routes |
|
|
167 | (1) |
|
Configuring Route Redistribution |
|
|
168 | (1) |
|
Deactivating Routing Updates |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
Enabling Snapshot Routing |
|
|
172 | (1) |
|
Snapshot Routing Configuration Example |
|
|
173 | (2) |
|
|
175 | (7) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
ISDN Caller Identification |
|
|
178 | (1) |
|
Called-Party Number Answering |
|
|
179 | (1) |
|
|
180 | (1) |
|
ISDN BRI Configuration Example |
|
|
181 | (1) |
|
Monitoring the ISDN Interface |
|
|
182 | (5) |
|
The show interface bri Command |
|
|
182 | (1) |
|
|
183 | (2) |
|
Verifying and Troubleshooting PPP Multilink |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (11) |
|
|
187 | (1) |
|
|
188 | (1) |
|
Configuring the Tl/El Controller for PRI |
|
|
189 | (2) |
|
Additional ISDN PRI Configuration Parameters |
|
|
191 | (1) |
|
PRI Configuration Example |
|
|
192 | (1) |
|
ISDN BRI to PRI Connection Example Using DDR |
|
|
193 | (5) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (3) |
|
|
203 | (30) |
|
|
203 | (11) |
|
Legacy DDR with a Single Destination |
|
|
203 | (2) |
|
Legacy DDR with Multiple Destinations |
|
|
205 | (3) |
|
|
208 | (1) |
|
|
209 | (1) |
|
Configuring Rotary Groups |
|
|
210 | (1) |
|
Configuring ISDN for Rotary Groups |
|
|
211 | (1) |
|
Asynchronous Interface Groups |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (13) |
|
Overview of Dialer Profiles |
|
|
214 | (2) |
|
Configuring Dialer Profiles |
|
|
216 | (2) |
|
|
218 | (1) |
|
Placing Calls with Dialer Profiles |
|
|
219 | (1) |
|
Receiving Calls with Dialer Profiles |
|
|
220 | (2) |
|
Using Dialer Profiles with ISDN B Channels |
|
|
222 | (1) |
|
Using Dialer Profiles with ISDN PRI |
|
|
223 | (2) |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (4) |
|
|
233 | (28) |
|
|
233 | (10) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (2) |
|
|
237 | (3) |
|
|
240 | (2) |
|
|
242 | (1) |
|
|
243 | (6) |
|
Configuring Frame Relay Encapsulation |
|
|
243 | (1) |
|
Configuring Frame Relay Maps |
|
|
244 | (2) |
|
Configuring Encapsulation per PVC |
|
|
246 | (1) |
|
Verifying Frame Relay Interface Configuration |
|
|
246 | (2) |
|
Verifying Frame Relay Operation |
|
|
248 | (1) |
|
|
249 | (6) |
|
|
249 | (1) |
|
Reachability Issues with Routing Updates |
|
|
250 | (2) |
|
Solution for Split Horizon Issue---Subinterfaces |
|
|
252 | (1) |
|
Configuring Frame Relay Subinterfaces |
|
|
253 | (2) |
|
|
255 | (1) |
|
|
256 | (2) |
|
|
258 | (3) |
|
Managing Frame Relay Traffic |
|
|
261 | (26) |
|
Frame Relay Traffic Shaping |
|
|
262 | (17) |
|
Frame Relay Traffic Shaping Terminology |
|
|
262 | (1) |
|
Overview of Frame Relay Traffic Shaping |
|
|
263 | (2) |
|
Types of Frame Relay Traffic Management |
|
|
265 | (1) |
|
Configuring Traffic Shaping over Frame Relay |
|
|
265 | (2) |
|
Traffic Shaping Configuration Steps |
|
|
267 | (2) |
|
Traffic Shaping through Rate Enforcement |
|
|
269 | (3) |
|
Traffic Shaping through Rate Dynamic Enforcement |
|
|
272 | (1) |
|
Traffic Shaping with Queuing |
|
|
273 | (3) |
|
Verifying Frame Relay Traffic Shaping |
|
|
276 | (3) |
|
|
279 | (2) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (5) |
|
|
287 | (28) |
|
|
287 | (6) |
|
|
287 | (2) |
|
Example of Dial Backup for Link Failure |
|
|
289 | (1) |
|
Activating a Dial Backup to Support Primary Line Traffic |
|
|
290 | (2) |
|
Example of Dial Backup for Excessive Traffic Load |
|
|
292 | (1) |
|
Backup Interface Operations |
|
|
293 | (6) |
|
|
293 | (1) |
|
Dialer Profiles as Backup Interfaces |
|
|
294 | (1) |
|
Configuring Dial Backups with Dialer Profiles |
|
|
295 | (4) |
|
Routing with the Load-Backup Feature |
|
|
299 | (3) |
|
|
299 | (2) |
|
Load Backup with IGRP and EIGRP |
|
|
301 | (1) |
|
Verifying Dial Backup Configuration |
|
|
302 | (2) |
|
show interface type slot/port Command |
|
|
302 | (2) |
|
|
304 | (2) |
|
Configuring Floating Static Routes as Backup |
|
|
304 | (2) |
|
|
306 | (2) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
310 | (5) |
|
Managing Network Performance with Queuing and Compression |
|
|
315 | (34) |
|
|
315 | (5) |
|
|
315 | (1) |
|
Effective Use of Traffic Prioritization |
|
|
316 | (1) |
|
Establishing a Queuing Policy |
|
|
317 | (1) |
|
Choosing a Cisco IOS Queuing Option |
|
|
318 | (2) |
|
Configuring Weighted Fair Queuing |
|
|
320 | (5) |
|
|
320 | (2) |
|
|
322 | (2) |
|
|
324 | (1) |
|
Class-Based Weighted Fair Queuing |
|
|
325 | (8) |
|
|
325 | (1) |
|
CBWFQ versus Flow-Based WFQ |
|
|
326 | (1) |
|
|
326 | (1) |
|
Weighted Random Early Detect |
|
|
327 | (2) |
|
Configuring CBWFQ---Step 1 |
|
|
329 | (1) |
|
Configuring CBWFQ---Step 2 |
|
|
330 | (1) |
|
Configuring CBWFQ with WRED---Step 2 |
|
|
331 | (1) |
|
Configuring CBWFQ Default Class---Step 2 |
|
|
331 | (1) |
|
Configuring CBWFQ---Step 3 |
|
|
332 | (1) |
|
|
332 | (1) |
|
Configuring Low-Latency Queuing |
|
|
333 | (2) |
|
|
333 | (1) |
|
|
334 | (1) |
|
Verifying Queuing Operation |
|
|
335 | (2) |
|
Verifying Queuing Operation Overview |
|
|
335 | (1) |
|
Queuing Comparison Summary |
|
|
335 | (2) |
|
Optimizing Traffic Flow with Data Compression |
|
|
337 | (5) |
|
Implementing Compression Overview |
|
|
337 | (1) |
|
Implementing Link Compression over a Point-to-Point Connection |
|
|
338 | (1) |
|
Implementing Payload Compression |
|
|
339 | (1) |
|
Using TCP/IP Header Compression |
|
|
340 | (1) |
|
|
340 | (1) |
|
Other Compression Considerations |
|
|
341 | (1) |
|
Configuring Data Compression |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (5) |
|
Scaling IP Addresses with NAT |
|
|
349 | (30) |
|
|
350 | (4) |
|
|
350 | (2) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (14) |
|
|
355 | (1) |
|
|
355 | (1) |
|
Dynamic NAT Configuration Example |
|
|
356 | (2) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (2) |
|
|
361 | (1) |
|
|
362 | (1) |
|
Configuring TCP Load Distribution |
|
|
363 | (1) |
|
TCP Load Distribution Configuration Example |
|
|
364 | (1) |
|
|
364 | (4) |
|
Verifying NAT Configuration |
|
|
368 | (2) |
|
Verifying NAT Translations |
|
|
368 | (1) |
|
Troubleshooting NAT Translations |
|
|
369 | (1) |
|
Clearing NAT Translations |
|
|
370 | (1) |
|
|
370 | (2) |
|
|
370 | (1) |
|
|
371 | (1) |
|
Traffic Types Supported by Cisco |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (5) |
|
Using AAA to Scale Access Control |
|
|
379 | (32) |
|
|
379 | (7) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
CiscoSecure Access Control Server |
|
|
383 | (3) |
|
|
386 | (18) |
|
The aaa new-model Command |
|
|
386 | (1) |
|
Configuring TACACS+ and RADIUS Clients |
|
|
386 | (3) |
|
Configuring AAA Authentication |
|
|
389 | (2) |
|
Configuring Login Authentication |
|
|
391 | (3) |
|
Enabling Password Protection at the Privileged Level |
|
|
394 | (1) |
|
Configuring PPP Authentication Using AAA |
|
|
395 | (2) |
|
Configuring AAA Authorization |
|
|
397 | (3) |
|
IOS Command Privilege Levels |
|
|
400 | (1) |
|
Configuring Command Authorization |
|
|
400 | (1) |
|
Configuring AAA Accounting |
|
|
401 | (3) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (5) |
|
|
411 | (42) |
|
|
411 | (5) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
414 | (2) |
|
|
416 | (10) |
|
|
416 | (1) |
|
|
417 | (2) |
|
Hybrid Fiber-Coaxial (HFC) Architecture |
|
|
419 | (1) |
|
Digital Signals over RF Channels |
|
|
420 | (2) |
|
Identifying Cable Technology Terms |
|
|
422 | (1) |
|
Cable Standards and Organizations |
|
|
422 | (1) |
|
|
423 | (1) |
|
Putting Cable Technology All Together |
|
|
424 | (1) |
|
Process for Provisioning a Cable Modem |
|
|
425 | (1) |
|
|
426 | (12) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (1) |
|
ADSL and POTS Coexistence |
|
|
430 | (1) |
|
ADSL Channels and Encoding |
|
|
431 | (1) |
|
Data over ADSL with Bridging |
|
|
432 | (2) |
|
|
434 | (1) |
|
|
435 | (2) |
|
Data over ADSL with PPPoA |
|
|
437 | (1) |
|
Configuring the CPE as the PPPoE Client |
|
|
438 | (4) |
|
Configuration Tasks for DSL |
|
|
438 | (1) |
|
Configure PPPoE in a VPDN Group |
|
|
438 | (1) |
|
Configuring a PPPoE Client |
|
|
439 | (1) |
|
Configure the PPPoE DSL Dialer Interface |
|
|
439 | (1) |
|
|
440 | (1) |
|
PAT for Use with DSL Example |
|
|
441 | (1) |
|
|
442 | (1) |
|
Configuring a Static Default Route |
|
|
442 | (1) |
|
Configuring DSL with PPPoA |
|
|
442 | (2) |
|
Configuration Tasks for DSL |
|
|
442 | (1) |
|
DSL Modulation Configuration |
|
|
443 | (1) |
|
Configure the DSL ATM Interface |
|
|
443 | (1) |
|
Configure the DSL Dialer Interface |
|
|
443 | (1) |
|
|
444 | (3) |
|
Determining the Layer to Troubleshoot |
|
|
444 | (1) |
|
|
445 | (1) |
|
Cisco 827 xDSL Port Pinouts |
|
|
445 | (1) |
|
Is the ATM Interface in an Administratively Down State? |
|
|
446 | (1) |
|
Is the Correct Power Supply Being Used? |
|
|
446 | (1) |
|
Is the DSL Operating Mode Correct? |
|
|
446 | (1) |
|
|
446 | (1) |
|
Is Data Being Received from the ISP? |
|
|
446 | (1) |
|
Is PPP Negotiating Properly? |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
449 | (4) |
|
|
453 | (64) |
|
VPN Overview: Types, Tunnels, and Terms |
|
|
453 | (13) |
|
|
453 | (3) |
|
|
456 | (1) |
|
|
457 | (3) |
|
Selecting VPN Technologies |
|
|
460 | (2) |
|
Layer 2 Tunneling Protocol (L2TP) |
|
|
462 | (1) |
|
Cisco Generic Routing Encapsulation (GRE) |
|
|
462 | (1) |
|
IP Security Protocol (IPSec) |
|
|
463 | (1) |
|
Identifying VPN and IPSec Terms |
|
|
464 | (2) |
|
Cisco IOS Cryptosystem Overview |
|
|
466 | (6) |
|
|
466 | (1) |
|
|
467 | (2) |
|
|
469 | (1) |
|
Key Exchange---Diffie-Hellman Algorithm |
|
|
470 | (1) |
|
|
470 | (2) |
|
|
472 | (9) |
|
|
472 | (1) |
|
|
472 | (1) |
|
Encapsulating Security Payload |
|
|
473 | (1) |
|
Tunnel versus Transport Mode |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
477 | (2) |
|
|
479 | (1) |
|
|
480 | (1) |
|
Task 1 --- Prepare for IKE and IPSec |
|
|
481 | (10) |
|
Step 1 --- Determine IKE (IKE Phase 1) Policy |
|
|
482 | (1) |
|
IKE Phase 1 Policy Parameters |
|
|
482 | (1) |
|
Create IKE Policies for a Purpose |
|
|
483 | (1) |
|
Define IKE Policy Parameters |
|
|
483 | (1) |
|
|
483 | (1) |
|
Step 2 --- Determine IPSec (IKE Phase 2) Policy |
|
|
484 | (1) |
|
IPSec Transforms Supported in Cisco IOS Software |
|
|
485 | (1) |
|
|
485 | (1) |
|
Encapsulating Security Payload |
|
|
485 | (2) |
|
|
487 | (1) |
|
|
488 | (1) |
|
Step 3---Check Current Configuration |
|
|
488 | (2) |
|
Step 4---Ensure the Network Works |
|
|
490 | (1) |
|
Step 5---Ensure ACLs Are Compatible with IPSec |
|
|
490 | (1) |
|
|
491 | (6) |
|
|
492 | (1) |
|
Step 2---Create IKE Policies |
|
|
492 | (1) |
|
Create IKE Policies with the crypto isakmp Command |
|
|
492 | (2) |
|
|
494 | (1) |
|
Step 3---Configure ISAKMP Identity |
|
|
494 | (2) |
|
Step 4---Configure Preshared Keys |
|
|
496 | (1) |
|
Step 5---Verify IKE Configuration |
|
|
497 | (1) |
|
|
497 | (10) |
|
Step 1---Configure Transform Set Suites |
|
|
498 | (1) |
|
Transform Set Negotiation |
|
|
499 | (1) |
|
Step 2---Configure Global IPSec Security Association Lifetimes |
|
|
500 | (1) |
|
|
501 | (1) |
|
Step 3---Create Crypto ACLs Using Extended Access Lists |
|
|
501 | (1) |
|
Configure Symmetrical Peer Crypto ACLs |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
Step 4---Configure IPSec Crypto Maps |
|
|
503 | (1) |
|
Example crypto map Commands |
|
|
504 | (1) |
|
Step 5---Apply Crypto Maps to Interfaces |
|
|
505 | (1) |
|
IPSec Configuration Examples |
|
|
505 | (2) |
|
Task 4---Test and Verify IPSec |
|
|
507 | (3) |
|
The show crypto isakmp policy Command |
|
|
507 | (1) |
|
The show crypto ipsec transform-set Command |
|
|
507 | (1) |
|
The show crypto ipsec sa Command |
|
|
507 | (1) |
|
The show crypto map Command |
|
|
508 | (1) |
|
|
508 | (1) |
|
The debug crypto Commands |
|
|
509 | (1) |
|
Crypto System Error Messages for ISAKMP |
|
|
509 | (1) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
512 | (5) |
Appendix A Glossary of Key Terms |
|
517 | (14) |
Appendix B Check Your Understanding Answer Key |
|
531 | (34) |
Appendix C Case Studies |
|
565 | (10) |
Index |
|
575 | |