User`s guide

Table of Contents
xxvi XSR-1805 Users Guide
Client...................................................................................................................... 255
Configuring OSPF with Fail Over ..................................................................... 256
Server 1.................................................................................................................. 256
Server 2.................................................................................................................. 256
Client...................................................................................................................... 256
Limitations............................................................................................................ 257
XSR VPN Features............................................................................................................... 258
VPN Configuration Overview .......................................................................................... 259
Master Key Generation ............................................................................................... 260
ACL Configuration Rules ........................................................................................... 261
Configuring ACLs ............................................................................................... 261
Selecting Policies: IKE/IPSec Transform-Sets.......................................................... 263
Security Policy Considerations .......................................................................... 264
Configuring Policy............................................................................................... 264
Creating Crypto Maps................................................................................................. 265
Configuring Crypto Maps .................................................................................. 265
Authentication, Authorization and Accounting Configuration ........................... 266
AAA Commands ................................................................................................. 266
Configuring AAA ................................................................................................ 267
PKI Configuration Options......................................................................................... 268
Configuring PKI................................................................................................... 269
PKI Certificate Enrollment Example ......................................................................... 269
Interface VPN Options ................................................................................................ 274
VPN Interface Sub-Commands.......................................................................... 274
Configuring a Simple VPN Site-to-Site Application...................................................... 275
Configuring the VPN Using EZ-IPSec ............................................................................. 278