Specifications
Table Of Contents
- Contents
- Preface
- Getting Started
- Basic Router Configuration
- Interface Port Labels
- Viewing the Default Configuration
- Information Needed for Configuration
- Configuring Basic Parameters
- Configuring Static Routes
- Configuring Dynamic Routes
- Configuring Enhanced IGRP
- Basic Router Configuration
- Configuring Your Router for Ethernet and DSL Access
- Sample Network Deployments
- Configuring PPP over Ethernet with NAT
- Configuring PPP over ATM with NAT
- Configuring a LAN with DHCP and VLANs
- Configuring a VPN Using Easy VPN and an IPSec Tunnel
- Configure the IKE Policy
- Configure Group Policy Information
- Apply Mode Configuration to the Crypto Map
- Enable Policy Lookup
- Configure IPSec Transforms and Protocols
- Configure the IPSec Crypto Method and Parameters
- Apply the Crypto Map to the Physical Interface
- Create an Easy VPN Remote Configuration
- Verifying Your Easy VPN Configuration
- Configuration Example
- Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation
- Configuring a Simple Firewall
- Configuring a Wireless LAN Connection
- Sample Configuration
- Configuring Additional Features and Troubleshooting
- Additional Configuration Options
- Configuring Security Features
- Configuring Dial Backup and Remote Management
- Troubleshooting
- Reference Information
- Cisco IOS Software Basic Skills
- Concepts
- ROM Monitor
- Common Port Assignments

12-4
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Chapter 12 Configuring Security Features
Configuring Cisco IOS Firewall IDS
Configuring Cisco IOS Firewall IDS
Cisco IOS Firewall Intrusion Detection System (IDS) technology enhances perimeter firewall protection
by taking appropriate action on packets and flows that violate the security policy or represent malicious
network activity.
Cisco IOS Firewall IDS identifies 59 of the most common attacks using “signatures” to detect patterns
of misuse in network traffic. It acts as an in-line intrusion detection sensor, watching packets and
sessions as they flow through the router, scanning each to match any of the IDS signatures. When it
detects suspicious activity, it responds before network security can be compromised, logs the event, and,
depending on configuration, sends an alarm, drops suspicious packets, or resets the TCP connection.
For additional information about configuring Cisco IOS Firewall IDS, see the “Configuring Cisco IOS
Firewall Intrusion Detection System” section of the Cisco IOS Release 12.3 Security Configuration
Guide.
Configuring VPNs
A virtual private network (VPN) connection provides a secure connection between two networks over a
public network such as the Internet. Cisco
1800 series fixed-configuration access routers support
site-to-site VPNs using IP security (IPSec) tunnels and generic routing encapsulation (GRE). Permanent
VPN connections between two peers, or dynamic VPNs using EZVPN or DMVPN which create and tear
down VPN connections as needed, can be configured.
Chapter 6, “Configuring a VPN Using Easy VPN
and an IPSec Tunnel,” and Chapter 7, “Configuring VPNs Using an IPSec Tunnel and Generic Routing
Encapsulation,” show examples of how to configure your router with these features. For more
information about IPSec and GRE configuration, see the “Configuring IPSec Network Security” chapter
of the Cisco IOS Release 12.3 Security Configuration Guide.
For information about additional VPN configurations supported by Cisco 1800 series
fixed-configuration access routers, see the following feature documents:
• “VPN Access Control Using 802.1X Authentication”—802.1X authentication allows enterprise
employees to access their enterprise networks from home while allowing other household members
to access only the Internet.
• “EZVPN Server”—Cisco 1800 series fixed-configuration routers can be configured to act as
EZVPN servers, letting authorized EZVPN clients establish dynamic VPN tunnels to the connected
network.
• “Dynamic Multipoint VPN (DMVPN)”—The DMVPN feature creates VPN tunnels between
multiple routers in a multipoint configuration as needed, simplifying the configuration and
eliminating the need for permanent, point-to-point VPN tunnels.