Specifications
Index 7
show interfaces tunnel command 3-7
show ip nat translations verbose command 4-8
show version command 3-18
source routing, disabling 2-5
spoofing, protecting against 2-5
startup configuration, saving 1-11
static translation, IP addresses 4-5
stub domain, NAT configured on 4-4
subinterface configuration mode, summary 1-10
syslog, special considerations 2-3
T
Tab key, command completion 1-2
TACACS+, implementing 2-3
technical support xiii
Telnet access considerations 2-3
template configurations, special considerations 2-3
Terminal Access Controller Access Control System Plus
See TACACS+
traffic priority management
See WFQ
transform sets
changing 3-22
commands (table) 3-22
crypto map entries and 3-27, 4-17
defining 4-13
description 3-22
verifying 3-25, 4-16
transport mode
description 3-24, 4-15
IPSec (figure) 3-25, 4-16
transport protocols (tunneling) 3-4
troubleshooting
crypto access lists (tips) 3-21
entering ROM monitor mode at startup 1-9
extended access lists 3-37, 4-26
GRE tunnels 3-8
IKE policy verification 3-18
syslog message logs for 2-3
tunnel destination command 3-6
tunnel mode
configuring 4-11
description 3-24, 4-15
IPSec (figure) 3-25, 4-16
tunnel mode gre ip command 3-6
tunnel source command 3-6
tunneling
components 3-4
description 3-4
encryption in 3-5
special considerations 2-3
U
user EXEC mode, summary 1-9
V
verifying
crypto access lists 3-21, 4-13
crypto map entries 3-29, 4-19
crypto map interface associations 3-32, 4-21
extended access lists 3-35, 3-37, 4-25, 4-26
GRE tunnel configuration 3-7
IKE policies 3-18
IPSec SAs global lifetimes 3-20
IPSec tunnel mode 4-16
static inside source address translation 4-8
transform sets 3-25, 4-16
WFQ configuration 3-11
Virtual Private Networks
See VPNs
virtual terminal ports, protecting 2-5
VPNs
configuration assumptions 2-7
See also extranet VPN scenario