![Cisco 7401ASR Скачать руководство пользователя страница 90](http://html.mh-extra.com/html/cisco/7401asr/7401asr_installation-and-configuration-manual_66550090.webp)
4-2
Cisco 7401ASR Installation and Configuration Guide
OL-5419-01 B0
Chapter 4 Configuring the VPN Acceleration Module
Configuration Tasks
Using the EXEC Command Interpreter
You modify the configuration of your router through the software command interpreter called the EXEC
(also called enable mode). You must enter the privileged level of the EXEC command interpreter with
the enable command before you can use the configure command to configure a new interface or change
the existing configuration of an interface. The system prompts you for a password if one has been set.
The system prompt for the privileged level ends with a pound sign (#) instead of an angle bracket (>).
At the console terminal, use the following procedure to enter the privileged level:
Step 1
At the user-level EXEC prompt, enter the enable command. The EXEC prompts you for a
privileged-level password as follows:
Router> enable
Password:
Step 2
Enter the password (the password is case sensitive). For security purposes, the password is not displayed.
When you enter the correct password, the system displays the privileged-level system prompt (#):
Router#
This completes the procedure for entering the privileged level of the EXEC command interpreter.
Configuring IKE
If you do not specify a value for a parameter, the default value is assigned. For information on default
values, refer to the “IP Security and Encryption” chapter of the
Security Command Reference
publication.
To configure a policy, use the following commands, starting in global configuration mode:
For detailed information on creating IKE policies, refer to the “Configuring Internet Key Exchange
Security Protocol” chapter in the
Security Configuration Guide
publication.
Command
Purpose
Step 1
crypto isakmp policy priority Identifies the policy to create, and enters config-isakmp
command mode.
Step 2
encryption {des | 3des}
Specifies the encryption algorithm.
Step 3
group {1 | 2}
Specifies the Diffie-Hellman group identifier.