Cisco 7100 Series Specifications

Browse online or download Specifications for Networking Cisco 7100 Series. Cisco 7100 Series Specifications User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 112
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Cisco Systems, Inc.
Corporate Headquarters
Tel:
800 553-NETS (6387)
Fax:
408 526-4000
408 526-4100
Cisco 7100 Series VPN
Configuration Guide
Customer Order Number: DOC-786342=
Text Part Number: 78-6342-01
Page view 0
1 2 ... 112

Summary of Contents

Page 1 - Configuration Guide

170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comCisco Systems, Inc.Corporate HeadquartersTel:800 553-NETS (6387)Fax:408 526-4000408

Page 2

Documentation CD-ROMCisco 7100 Series VPN Configuration GuidexivNote If you are a network administrator and need personal technical assistance with aC

Page 3 - Preface vii

Comprehensive Configuration ExamplesCisco 7100 Series VPN Configuration Guide4-28 set peer 172.16.2.7 set transform-set proposal4 match address 111!in

Page 4 - Audience

Extranet VPN Business Scenario 4-29Headquarters Router Configuration no keepalive fair-queue 64 256 0 framing c-bit cablelength 10 dsu bandwidth 4421

Page 5 - Organization

Comprehensive Configuration ExamplesCisco 7100 Series VPN Configuration Guide4-30Business Partner Router Configurationbus-ptnr# show running-configBuil

Page 6 - Related Documentation

Extranet VPN Business Scenario 4-31Business Partner Router Configuration fair-queue 64 256 0 framing c-bit cablelength 10 dsu bandwidth 44210 clock s

Page 7 - Preface xi

Comprehensive Configuration ExamplesCisco 7100 Series VPN Configuration Guide4-32

Page 8 - Conventions

Index 1INDEXSymbols? command 1-2Aabbreviating commands, context-sensitive help 1-2access controlplanning 2-5undefined packets and 3-36, 4-26access gr

Page 9 - Cisco Connection Online

Cisco 7100 Series VPN Configuration GuideIndex 2business partner router 4-30 to 4-31headquarters router 4-27 to 4-29intranetheadquarters router 3-37 t

Page 10 - Documentation CD-ROM

Index 3documentationaudience viiiCD-ROM xivconventions xiifeedback xivlatest version ixorganization ixpurpose viirelated xEedge routers, QoS function

Page 11 - Using Cisco IOS Software

Cisco 7100 Series VPN Configuration GuideIndex 4IICMP Host Unreachable message 3-36, 4-26IKEdescription 3-12keysSee keys, preshared 3-16, 4-10policies

Page 12 - Getting Help

Index 5tunnelsconfiguring 4-9verifying SA global lifetimes 3-20IPSec access listsexplicitly permitting traffic (note) 4-12requirements 3-19, 4-12IPSe

Page 13 - • controller t1 1

CHAPTER Using Cisco IOS Software 1-11Using Cisco IOS SoftwareThis chapter provides helpful tips for understanding and configuring Cisco IOS softwareusi

Page 14

Cisco 7100 Series VPN Configuration GuideIndex 6Ooutside global address 4-5outside local address 4-5outside network 4-4Ppackets, flow classification 3

Page 15

Index 7show interfaces tunnel command 3-7show ip nat translations verbose command 4-8show version command 3-18source routing, disabling 2-5spoofing,

Page 16

Cisco 7100 Series VPN Configuration GuideIndex 8See also intranet VPN scenarioWweighted fair queuingSee WFQWFQconfiguring fair queuing 3-10traffic pri

Page 17

Getting HelpCisco 7100 Series VPN Configuration Guide1-2Getting HelpEntering a question mark (?) at the system prompt displays a list of commands avai

Page 18 - Understanding Command Modes

Using Cisco IOS Software 1-3Finding Command OptionsFinding Command OptionsThis section provides an example of how to display syntax for a command. Th

Page 19 - Summary of Main Command Modes

Getting HelpCisco 7100 Series VPN Configuration Guide1-4Router(config)# controller t1 ?<0-3> Controller unit numberRouter(config)# controller t

Page 20 - Router(config-subif)#

Using Cisco IOS Software 1-5Finding Command OptionsRouter(config-controller)# cas-group ?<0-23> Channel numberRouter(config-controller)# cas-gr

Page 21 - Saving Configuration Changes

Getting HelpCisco 7100 Series VPN Configuration Guide1-6Router(config-controller)# cas-group 1 timeslots ?<1-24> List of timeslots which compris

Page 22 - Saving Configuration Changes

Using Cisco IOS Software 1-7Finding Command OptionsRouter(config-controller)# cas-group 1 timeslots 1-24 type ?e&m-fgb E & M Type II FGBe&

Page 23 - Before You Begin

Understanding Command ModesCisco 7100 Series VPN Configuration Guide1-8Understanding Command ModesThe Cisco IOS user interface is divided into many di

Page 24

Using Cisco IOS Software 1-9Summary of Main Command ModesThe configuration modes allow you to make changes to the running configuration. If youlater sa

Page 25 - Considerations

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUTNOTICE. ALL STATEMENTS, INFORMATION, AND RECOMME

Page 26

Understanding Command ModesCisco 7100 Series VPN Configuration Guide1-10For more information regarding command modes, refer to the “Using the Command

Page 27 - Before You Begin 2-5

Using Cisco IOS Software 1-11Using the no and default Forms of CommandsUsing the no and default Forms of CommandsAlmost every configuration command al

Page 28

Saving Configuration ChangesCisco 7100 Series VPN Configuration Guide1-12

Page 29 - Assumptions

CHAPTER Before You Begin 2-12Before You BeginThis chapter provides an overview of the business scenarios covered in this guide, itemsyou should consid

Page 30

Overview of Business ScenariosCisco 7100 Series VPN Configuration Guide2-2In each scenario, a tunnel is constructed, encryption is applied on the tunn

Page 31 - Scenario

Before You Begin 2-3ConsiderationsConsiderationsThe following are considerations to observe when configuring a VPN on your Cisco 7100series router:• S

Page 32 - Scenario Description

ConsiderationsCisco 7100 Series VPN Configuration Guide2-4— Be careful not to violate access control lists. You can configure a tunnel with asource and

Page 33

Before You Begin 2-5Considerations— Think about access control before you connect a console port to the network in anyway, including attaching a mode

Page 34 - Step 1—Configuring the Tunnel

ConsiderationsCisco 7100 Series VPN Configuration Guide2-6— Normally, you should disable directed broadcasts for all applicable protocols onyour firewa

Page 35 - Step 1—Configuring the Tunnel

Before You Begin 2-7AssumptionsAssumptionsThis guide assumes the following:• You have successfully installed, powered on, and initially configured you

Page 36

Preface viiPrefaceThis preface describes the purpose, objectives, audience, organization, and conventions ofthe Cisco 7100 Series VPN Configuration Gu

Page 37

AssumptionsCisco 7100 Series VPN Configuration Guide2-8On CCO, follow this path:Service and Support: Technical Documents: Documentation Home Page: Cis

Page 38

CHAPTER Intranet VPN Business Scenario 3-13Intranet VPN BusinessScenarioThis chapter explains the basic tasks for configuring an IP-based, intranet Vir

Page 39

Scenario DescriptionCisco 7100 Series VPN Configuration Guide3-2Scenario DescriptionFigure 3-1 shows a headquarters network providing a remote office a

Page 40

Intranet VPN Business Scenario 3-3Scenario DescriptionFigure 3-2 Intranet VPN Scenario Physical ElementsThe configuration steps in the following secti

Page 41 - Step 3—Configuring Encryption

Step 1—Configuring the TunnelCisco 7100 Series VPN Configuration Guide3-4Table 3-1 Physical ElementsStep 1—Configuring the TunnelTunneling provides a w

Page 42

Intranet VPN Business Scenario 3-5Step 1—Configuring the TunnelFigure 3-3 IP Tunneling Terminology and ConceptsGRE is capable of handling the transpo

Page 43 - Configuring IKE Policies

Step 1—Configuring the TunnelCisco 7100 Series VPN Configuration Guide3-6Configuring the Tunnel Interface, Source, and DestinationTo configure a GRE tun

Page 44 - Creating Policies

Intranet VPN Business Scenario 3-7Verifying the Tunnel Interface, Source, and DestinationNote When configuring GRE, you must have only Cisco routers o

Page 45 - • RSA signatures method:

Step 2—Configuring Quality of ServiceCisco 7100 Series VPN Configuration Guide3-8 Queueing strategy:fifo Output queue 0/0, 0 drops; input queue 0/75

Page 46 - Configuring Preshared Keys

Intranet VPN Business Scenario 3-9Step 2—Configuring Quality of ServiceYou configure QoS features throughout a network to provide for end-to-end QoS d

Page 47

AudienceCisco 7100 Series VPN Configuration GuideviiiThe intranet and extranet business scenarios introduced in this guide include specific tasksand co

Page 48 - Verifying IKE Policies

Step 2—Configuring Quality of ServiceCisco 7100 Series VPN Configuration Guide3-10Configuring Weighted Fair QueuingWFQprovidestrafficpriority management

Page 49 - Configuring IPSec

Intranet VPN Business Scenario 3-11Verifying Weighted Fair QueuingVerifying Weighted Fair QueuingTo verify the configuration:• Enter the show interfac

Page 50

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-12IPSec is a framework of open standards, developed by the Internet Engineerin

Page 51 - Verifying Crypto Access Lists

Intranet VPN Business Scenario 3-13Configuring IKE PoliciesNote This section only contains basic configuration information for enabling encryptionserv

Page 52 - Defining Transform Sets

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-14Creating PoliciesTo create an IKE policy, complete the followingsteps starti

Page 53

Intranet VPN Business Scenario 3-15Configuring IKE PoliciesAdditional Configuration Required for IKE PoliciesDepending on which authentication method

Page 54 - Step 3—Configuring Encryption

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-16• Preshared keys authentication method:If you specify preshared keys as the

Page 55 - Verifying Transform Sets

Intranet VPN Business Scenario 3-17Configuring IKE PoliciesNote Set an ISAKMP identity whenever you specify preshared keys. The addresskeyword is typ

Page 56

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-18Verifying IKE PoliciesTo verify the configuration:• Enterthe show crypto isak

Page 57

Intranet VPN Business Scenario 3-19Configuring IPSecBridging software.X.25 software, Version 3.0.0.SuperLAT software copyright 1990 by Meridian Techn

Page 58 - Creating Crypto Map Entries

Preface ixOrganizationOrganizationThe major sections of this guide are as follows:Where to Get the Latest Version of This GuideThe hard copy of this

Page 59 - Verifying Crypto Map Entries

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-20Setting Global Lifetimes for IPSec Security AssociationsYoucan change the gl

Page 60

Intranet VPN Business Scenario 3-21Configuring IPSecCreating Crypto Access ListsCrypto access lists are used to define which IP trafficwill beprotected

Page 61

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-22Defining Transform SetsA transform set represents a certain combination of se

Page 62

Intranet VPN Business Scenario 3-23Configuring IPSecNote AH and ESP can be used independently or together, although for most applicationsjust one of

Page 63

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-24Note In IPSec transport mode, only the IP payload is encrypted, and the orig

Page 64

Intranet VPN Business Scenario 3-25Configuring IPSecFigure 3-4 IPSec in Tunnel and Transport ModesVerifying Transform SetsTo verify the configuration:

Page 65 - To verify the configuration:

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-26Configuring Crypto MapsCrypto map entries created for IPSec pull together the

Page 66

Intranet VPN Business Scenario 3-27Configuring Crypto MapsWhen two peers try to establish a SA, they must each have at least one crypto map entrythat

Page 67

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-28Creating Crypto Map EntriesTo create a crypto map entry that will use IKE to

Page 68

Intranet VPN Business Scenario 3-29Configuring Crypto MapsVerifying Crypto Map EntriesTo verify the configuration:• Enter the show crypto map EXEC com

Page 69

Related DocumentationCisco 7100 Series VPN Configuration GuidexRelated DocumentationYour Cisco 7100 series router and the Cisco IOS software running o

Page 70

Step 3—Configuring EncryptionCisco 7100 Series VPN Configuration Guide3-30TipsIf you have trouble, make sure you are using the correct IP addresses.Ap

Page 71

Intranet VPN Business Scenario 3-31Configuring Crypto MapsFor redundancy, you could apply the same crypto map set to more than one interface. Thedefa

Page 72

Step 4—Configuring Cisco IOS Firewall FeaturesCisco 7100 Series VPN Configuration Guide3-32Verifying Crypto Map Interface AssociationsTo verify the co

Page 73 - Extranet VPN Business

Intranet VPN Business Scenario 3-33Step 4—Configuring Cisco IOS Firewall FeaturesYou can use Cisco IOS Firewall features to configure your Cisco IOS r

Page 74

Step 4—Configuring Cisco IOS Firewall FeaturesCisco 7100 Series VPN Configuration Guide3-34Note Refer to the “Traffic Filtering and Firewalls” part of

Page 75

Intranet VPN Business Scenario 3-35Creating Extended Access Lists Using Access List NumbersCreating Extended Access Lists Using Access List NumbersTo

Page 76

Step 4—Configuring Cisco IOS Firewall FeaturesCisco 7100 Series VPN Configuration Guide3-36Applying Access Lists to InterfacesAfter you create an acce

Page 77

Intranet VPN Business Scenario 3-37Verifying Extended Access Lists Are Applied CorrectlyVerifying Extended Access Lists Are Applied CorrectlyTo verif

Page 78

Comprehensive Configuration ExamplesCisco 7100 Series VPN Configuration Guide3-38!hostname hq-sanjose!boot system flash bootflash:boot bootldr bootfla

Page 79

Intranet VPN Business Scenario 3-39Headquarters Router Configurationinterface Serial1/0 ip address 172.17.2.4 255.255.255.0 no ip directed-broadcast

Page 80

Preface xiRelated Documentation— For information on setting up quality of service (QoS), refer to the Quality ofService Solutions Configuration Guide

Page 81

Comprehensive Configuration ExamplesCisco 7100 Series VPN Configuration Guide3-40Remote Office Router Configurationro-rtp# show running-configBuilding c

Page 82

Intranet VPN Business Scenario 3-41Remote Office Router Configurationinterface FastEthernet0/0 ip address 10.1.4.2 255.255.255.0 no ip directed-broad

Page 83 - 67890 address 172.17.2.4

Comprehensive Configuration ExamplesCisco 7100 Series VPN Configuration Guide3-42

Page 84

CHAPTER Extranet VPN Business Scenario 4-14Extranet VPN BusinessScenarioThis chapter explains the basic tasks for configuring an IP-based, extranet Vir

Page 85

Scenario DescriptionCisco 7100 Series VPN Configuration Guide4-2Scenario DescriptionThe extranet scenario introduced in Figure 4-1 builds on the intra

Page 86

Extranet VPN Business Scenario 4-3Scenario DescriptionThe IPSec tunnel between the two sites is configured on the second serial interface inchassis sl

Page 87

Step 1—Configuring Network Address TranslationCisco 7100 Series VPN Configuration Guide4-4Table 4-1 lists the scenario’s physical elements.Table 4-1 P

Page 88 - Transport mode

Extranet VPN Business Scenario 4-5Step 1—Configuring Network Address Translation2 Verifying Static Inside Source Address TranslationStatictranslation

Page 89 - Configuring Crypto Maps

Step 1—Configuring Network Address TranslationCisco 7100 Series VPN Configuration Guide4-6Figure 4-3 NAT Inside Source TranslationThe following proces

Page 90

Extranet VPN Business Scenario 4-7Configuring Static Inside Source Address Translation5 When the router receivesthe packetwith the inside global IP a

Page 91

ConventionsCisco 7100 Series VPN Configuration GuidexiiConventionsCommand descriptions use the following conventions:Convention Descriptionboldface fo

Page 92

Step 1—Configuring Network Address TranslationCisco 7100 Series VPN Configuration Guide4-8Verifying Static Inside Source Address TranslationTo verify

Page 93 - Configuring Crypto Maps

Extranet VPN Business Scenario 4-9Step 2—Configuring Encryption and an IPSec TunnelStep 2—Configuring Encryption and an IPSec TunnelFor the ISM in slo

Page 94

Step 2—Configuring Encryption and an IPSec TunnelCisco 7100 Series VPN Configuration Guide4-10Configuring a Different Shared KeyBecause preshared keys

Page 95

Extranet VPN Business Scenario 4-11Configuring IPSec and IPSec Tunnel ModeNote Set an ISAKMP identity whenever you specify preshared keys. The addres

Page 96

Step 2—Configuring Encryption and an IPSec TunnelCisco 7100 Series VPN Configuration Guide4-125 Defining Transform Sets and Configuring IPSec Tunnel Mod

Page 97

Extranet VPN Business Scenario 4-13Configuring IPSec and IPSec Tunnel ModeVerifying Crypto Access ListsTo verify the configuration:• Enter the show ac

Page 98

Step 2—Configuring Encryption and an IPSec TunnelCisco 7100 Series VPN Configuration Guide4-14Note AH and ESP can be used independently or together, a

Page 99

Extranet VPN Business Scenario 4-15Configuring IPSec and IPSec Tunnel ModeNote In IPSec tunnel mode, the entire original IP datagram is encrypted, an

Page 100

Step 2—Configuring Encryption and an IPSec TunnelCisco 7100 Series VPN Configuration Guide4-16Figure 4-4 IPSec in Tunnel and Transport ModesVerifying

Page 101

Extranet VPN Business Scenario 4-17Configuring Crypto MapsConfiguring Crypto MapsForIPSec to succeed between twoIPSec peers, both peers’ crypto map en

Page 102

Preface xiiiCisco Connection OnlineCisco Connection OnlineCisco Connection Online (CCO) is Cisco Systems’ primary, real-time support channel.Maintena

Page 103

Step 2—Configuring Encryption and an IPSec TunnelCisco 7100 Series VPN Configuration Guide4-18Creating Crypto Map EntriesTo create crypto map entries

Page 104

Extranet VPN Business Scenario 4-19Configuring Crypto MapsVerifying Crypto Map EntriesTo verify the configuration:• Enter the show crypto map EXEC com

Page 105

Step 2—Configuring Encryption and an IPSec TunnelCisco 7100 Series VPN Configuration Guide4-20TipsIf you have trouble, make sure you are using the cor

Page 106

Extranet VPN Business Scenario 4-21Configuring Crypto MapsFor redundancy, you could apply the same crypto map set to more than one interface. Thedefa

Page 107

Step 3—Configuring Quality of ServiceCisco 7100 Series VPN Configuration Guide4-22Step 3—Configuring Quality of ServiceCisco IOS QoS service models, fe

Page 108

Extranet VPN Business Scenario 4-23Verifying Weighted Fair QueuingVerifying Weighted Fair QueuingTo verify the configuration:• Enter the show interfac

Page 109

Step 4—Configuring Cisco IOS Firewall FeaturesCisco 7100 Series VPN Configuration Guide4-24Note Refer to the “Traffic Filtering and Firewalls” part of

Page 110

Extranet VPN Business Scenario 4-25Step 4—Configuring Cisco IOS Firewall FeaturesVerifying Extended Access ListsTo verify the configuration:• Enter th

Page 111

Step 4—Configuring Cisco IOS Firewall FeaturesCisco 7100 Series VPN Configuration Guide4-26For inbound access lists, after receiving a packet, the Cis

Page 112

Extranet VPN Business Scenario 4-27Comprehensive Configuration ExamplesComprehensive Configuration ExamplesFollowingare comprehensivesample configurati

Comments to this Manuals

No comments