Introduction to the Router Management Center


The Router MC is an enterprise GUI-based application that is part of the Cisco VMS (VPN/Security Management Solution) product. With the Router MC, you can configure VPN connections and maintain VPN configurations. The Router MC has a number of compelling features to manage routers within a large enterprise.

graphics/alert_icon.gif

Secure Socket Layer (SSL) is used between the client and the Router MC. Secure Shell (SSH) is used between the Router MC and the managed router.


Key Concepts

Before getting into VPN configurations using the Router MC, you need to become familiar with a number of concepts:

  • Activities are how devices are configured. All changes must be done within an activity.

  • Building blocks are reusable components that aid in configuring multiple devices. Building blocks refer to transform sets and network groups.

  • Device hierarchy and inheritance refers to two concepts. First, individual devices can inherit configuration parameters from a group . Second, you can create groups and place routers within the groups you create.

  • Device import is the process of getting devices into the Router MC inventory. You can import devices through querying or by file importation. You can import individual devices or multiple devices simultaneously .

  • Hub and spoke topologies are supported. Tunnels are created on the spoke devices, and the Router MC automatically creates the configuration on the hub router.

  • Jobs are VPN configuration deployments. You can deploy jobs to multiple devices or single devices.

  • Predefined device groups and policies are included in the Router MC to save time in configuring VPN tunnels.

  • Uploading existing VPN configurations is something you can do to the )Router MC if routers already have VPN configurations.

  • VPN settings and policies are the ways that the Router MC divides VPN configurations. Within this division are six specific areas:

    • IKE policies are the security parameters for the IKE Phase 1 tunnel.

    • Network address translation ( NAT ) policies define address translation rules.

    • Network groups are a way to configure names for networks and hosts . You can then use the names in your VPN configurations.

    • Transform sets are the security parameters for the IKE Phase 2 tunnel.

    • Tunnel policies are like crypto maps and define what crypto access control lists (ACLs) and transform sets protect the traffic.

    • VPN settings define parameters such as internal networks, internal interfaces, the hub to be used with spoke devices, and routing and fragmentation.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net