Cisco ISR 4000 Family Routers Administrator Guidance
Page
25
of
66
Note:
Logging of all traffic hitting the default deny acl can generate a large number of logs, and
a determination should be made whether it is necessary prior to entering this at the end of all
access lists.
To apply the acls to the interfaces:
TOE-common-criteria(config)#
interface GigabitEthernet0/0
TOE-common-criteria(config-if)#
ip access-group 199 in
TOE-common-criteria(config)#
interface GigabitEthernet0/1
TOE-common-criteria(config-if)#
ip access-group 100 in
Additional information on creation of packet filtering and VPN information flow policies is given
in Section 4.6.4 below.
3.3.7 Routing Protocols
The routing protocols are used to maintain routing tables. The routing tables can also be
configured and maintained manually. Refer to the applicable sections in
[3]
Configuration
Fundamentals
for configuration of the routing protocols.
3.3.8 MACSEC and MKA Configuration
The detailed steps to configure MKA, configure MACsec and MKA on interfaces are listed in
[17] -
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/macsec/configuration/xe-16/macsec-xe-
16-book/wan-macsec-mka-support-enhance.html#d74e990a1635
Note: For 256-bit encryption, the key-string length will be 64-characters. For 128-bit encryption,
the key-string length will be 32 characters.