Packet Tracer 5.2 New Ios Commands

Páginas: 14 (3366 palabras) Publicado: 6 de septiembre de 2011
Date updated: 2/24/2009

Packet Tracer 5.2 New IOS commands
REQ-1 Context Based Access List
Tag
REQ-1.1

Requirement
Router(config)#no ip inspect name inspection-name protocol [timeoutseconds] Protocols covered = http, icmp, tcp, telnet, udp, dns, https, ntp, radius, snmp, ssh, syslog, tacacs, and tftp Router(config-if)#no ip inspect inspection-name {in | out} Router(config)#no ip inspecttcp synwait-time seconds Router(config)#no ip inspect tcp finwait-time seconds Router(config)#no ip inspect tcp idle-time seconds Router(config)#no ip inspect udp idle-time seconds Router(config)#no ip inspect dns-timeout seconds Router(config)#no ip inspect max-incomplete high number Router(config)#no ip inspect max-incomplete low number Router(config)#no ip inspect one-minute high numberRouter(config)#no ip inspect one-minute low number Router#show ip inspect { name WORD | config | interfaces | session [detail] | all } Router#debug ip inspect protocol protocol-name

Priority
5

REQ-1.2 REQ-1.3 REQ-1.4 REQ-1.5 REQ-1.6 REQ-1.7 REQ-1.8 REQ-1.9 REQ-1.10 REQ-1.11 REQ-1.12 REQ-1.13

5 5 5 5 5 5 5 5 5 5 5 5

REQ-2 Outside NAT
Tag
REQ-2.1 REQ-2.2 REQ-2.3

RequirementRouter(config)#no ip nat outside source list list-num pool pool-name Router(config)# no ip nat outside source {static global-ip local-ip} Router(config)# no ip nat outside source {static tcp | udp global-ip global-port local-ip local-port}

Priority
5 5 5

REQ-3 Improved TCP/IP
Tag
REQ-3.1.1

Requirement
Router(config)#service nagle

Priority
5

REQ-4 Emulation of SLARP feature
Tag
REQ-4.1Requirement
Router(config-if)#keepalive

Priority
5

REQ-5 AAA
Tag
REQ-5.1 REQ-5.2 REQ-5.3

Requirement
ACS service on generic server device Radius TACACS+

Priority
5 5 5

Copyright 2009 Cisco Systems.

1

Cisco Public Information

Date updated: 2/24/2009

Tag
REQ-5.4 REQ-5.4.1 REQ-5.4.1.1 REQ-5.4.1.2 REQ-5.4.1.3 REQ-5.4.1.4 REQ-5.4.1.5 REQ-5.5 REQ-5.6 REQ-5.7REQ-5.7.1 REQ-5.7.2 REQ-5.7.3 REQ-5.7.4 REQ-5.8 REQ-5.8.1

Requirement
AAA commands Commands to configure Router IOS to communicate with AAA server Router(config)#aaa new-model Router(config)# tacacs-server host ip-address [single-connection] Router(config)#tacacs-server key key (key to encrypt data between ACS and NAS) Router# show aaa [user | sessions | local user lockout] Router# clear aaa localuser lockout TACACS+ Attributes and Features Persistent TCP session configurable on ACS and AAA server both Authentication TACACS+ Authentication Router(config)# aaa authentication login {default | list_name} group {group_name | tacacs | redius } [ method2 [ method3 [ method 4 ] ] ] Router(config-line)#login authentication list-name (console, vtty) Router#debug aaa authentication AuthorizationRouter(config)#aaa authorization {network | exec | commands level | config-commands | reverse-access} {default | llist_name} method1 [method2…] – command only

Priority
5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5

REQ-6 IPsec & GRE VPN
Tag
REQ-6.1 REQ-6.2 REQ-6.3 REQ-6.3.1 REQ-6.3.2 REQ-6.3.3 REQ-6.3.4 REQ-6.3.5 REQ-6.4 REQ-6.5 REQ-6.5.1 REQ-6.6 REQ-6.6.1 REQ-6.6.2 REQ-6.6.3 REQ-6.6.4 REQ-6.6.4.1 REQ-6.6.4.2Requirement
Supports 5 steps of Ipsec. Support for SA (security associations) Support for IPsec encryption, authentication and data integrity algorithms. DES AES 3DES SHA1 DH key exchange AH ESP Transport mode, tunnel mode IKE ISAKMP, key exchange and negotiating security policies mechanics IKE phase 1 & 2 phase 1 in two modes main and aggressive, phase 2 in quick mode IKE modes (main,aggressive, quick) IKE policy establishment Router(config)#crypto isakmp policy priority IKE pre-share Router(config-isakm)#authentication pre-share Router(cofig-isakmp)#hash {sha | MD5} Router(config-isakmp)#encryption {des|3des|aes {128| 192|256}} Router(config-isakmp)#group{1 |2| 5} Router(config-isakmp)#lifetime seconds Router(config)#crypto isakmp key key address peer-ip-address Define IPSec...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Configuración SSH en Packet Tracer 5.2
  • Packet tracer
  • Packet Trace
  • packet tracer
  • Packet Tracer
  • Packet tracer
  • Packet tracer
  • Packet Tracer

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS