
▄Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide
ACL Rule......................................................................................................................................122
Redirecting Subscriber Sessions.................................................................................................122
Session Limits On Redirection.....................................................................................................123
Stopping Redirection....................................................................................................................123
Handling IP Fragments ................................................................................................................123
Recovery......................................................................................................................................123
AAA Accounting ...........................................................................................................................123
Viewing the Redirected Session Entries for a Subscriber................................................................123
IP Security........................................................................................................ 129
Overview...............................................................................................................................................131
Applicable Products and Relevant Sections ....................................................................................132
IPSec Terminology ...............................................................................................................................135
Crypto Access Control List (ACL).....................................................................................................135
Transform Set...................................................................................................................................135
ISAKMP Policy .................................................................................................................................135
Crypto Map.......................................................................................................................................135
Manual Crypto Maps....................................................................................................................136
ISAKMP Crypto Maps..................................................................................................................136
Dynamic Crypto Maps..................................................................................................................136
Implementing IPSec for PDN Access Applications...............................................................................137
How the IPSec-based PDN Access Configuration Works................................................................137
Configuring IPSec Support for PDN Access ....................................................................................138
Implementing IPSec for Mobile IP Applications....................................................................................140
How the IPSec-based Mobile IP Configuration Works.....................................................................140
Configuring IPSec Support for Mobile IP..........................................................................................143
Implementing IPSec for L2TP Applications ..........................................................................................145
How IPSec is Used for Attribute-based L2TP Configurations..........................................................145
Configuring Support for L2TP Attribute-based Tunneling with IPSec..............................................147
How IPSec is Used for PDSN Compulsory L2TP Configurations....................................................148
Configuring Support for L2TP PDSN Compulsory Tunneling with IPSec ........................................149
How IPSec is Used for L2TP Configurations on the GGSN.............................................................150
Configuring GGSN Support for L2TP Tunneling with IPSec............................................................151
Transform Set Configuration.................................................................................................................152
Configuring Transform Set ...............................................................................................................152
Verifying the Crypto Transform Set Configuration ...........................................................................152
ISAKMP Policy Configuration...............................................................................................................154
Configuring ISAKMP Policy..............................................................................................................154
Verifying the ISAKMP Policy Configuration......................................................................................155
ISAKMP Crypto Map Configuration......................................................................................................156
Configuring ISAKMP Crypto Maps...................................................................................................156
Verifying the ISAKMP Crypto Map Configuration.............................................................................157
Dynamic Crypto Map Configuration......................................................................................................159
Configuring Dynamic Crypto Maps...................................................................................................159
Verifying the Dynamic Crypto Map Configuration ............................................................................159
Manual Crypto Map Configuration........................................................................................................161
Configuring Manual Crypto Maps.....................................................................................................161
Verifying the Manual Crypto Map Configuration ..............................................................................162
Crypto Map and Interface Association..................................................................................................164
Applying Crypto Map to an Interface................................................................................................164
Verifying the Interface Configuration with Crypto Map.....................................................................164
FA Services Configuration to Support IPSec........................................................................................166
Modifying FA service to Support IPSec............................................................................................166
Verifying the FA Service Configuration with IPSec ..........................................................................167
HA Service Configuration to Support IPSec.........................................................................................168