Contents
v
Cisco Secure Router 520 Series Software Configuration Guide
OL-14210-01
Apply the Crypto Map to the Physical Interface
6-8
Create an Easy VPN Remote Configuration
6-9
Verifying Your Easy VPN Configuration
6-10
Configuration Example
6-10
C H A P T E R
7
Configuring VPNs Using an IPsec Tunnel and Generic Routing Encapsulation
7-1
Configure a VPN
7-2
Configure the IKE Policy
7-3
Configure Group Policy Information
7-4
Enable Policy Lookup
7-5
Configure IPsec Transforms and Protocols
7-5
Configure the IPsec Crypto Method and Parameters
7-6
Apply the Crypto Map to the Physical Interface
7-7
Configure a GRE Tunnel
7-8
Configuration Example
7-9
C H A P T E R
8
Configuring a Simple Firewall
8-1
Configure Access Lists
8-3
Configure Inspection Rules
8-4
Apply Access Lists and Inspection Rules to Interfaces
8-4
Configuration Example
8-5
C H A P T E R
9
Configuring a Wireless LAN Connection
9-1
Configure the Root Radio Station
9-2
Configure Bridging on VLANs
9-4
Configure Radio Station Subinterfaces
9-5
Configuration Example
9-6
P A R T
3
Configuring Additional Features and Troubleshooting
C H A P T E R
10
Additional Configuration Options
10-1
C H A P T E R
11
Configuring Security Features
11-1
Authentication, Authorization, and Accounting
11-1
Configuring AutoSecure
11-2
Configuring Access Lists
11-2
Access Groups
11-3
Summary of Contents for 520 Series
Page 15: ...xv Cisco Secure Router 520 Series Software Configuration Guide OL 14210 01 Preface ...
Page 18: ...xviii Cisco Secure Router 520 Series Software Configuration Guide OL 14210 01 Preface ...
Page 19: ...P A R T 1 Getting Started ...
Page 20: ......
Page 33: ...P A R T 2 Configuring Your Router for Ethernet and DSL Access ...
Page 34: ......
Page 103: ...P A R T 3 Configuring Additional Features and Troubleshooting ...
Page 104: ......
Page 123: ...P A R T 4 Reference Information ...
Page 124: ......
Page 162: ...Index IN 8 Cisco Secure Router 520 Series Software Configuration Guide OL 14210 01 ...