EasyManuals Logo
Home>Cisco>Network Router>ISR 4000 series

Cisco ISR 4000 series User Manual

Cisco ISR 4000 series
66 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #25 background imageLoading...
Page #25 background image
Cisco ISR 4000 Family Routers Administrator Guidance
Page 25 of 66
Note: Logging of all traffic hitting the default deny acl can generate a large number of logs, and
a determination should be made whether it is necessary prior to entering this at the end of all
access lists.
To apply the acls to the interfaces:
TOE-common-criteria(config)# interface GigabitEthernet0/0
TOE-common-criteria(config-if)# ip access-group 199 in
TOE-common-criteria(config)# interface GigabitEthernet0/1
TOE-common-criteria(config-if)# ip access-group 100 in
Additional information on creation of packet filtering and VPN information flow policies is given
in Section 4.6.4 below.
3.3.7 Routing Protocols
The routing protocols are used to maintain routing tables. The routing tables can also be
configured and maintained manually. Refer to the applicable sections in [3] Configuration
Fundamentals for configuration of the routing protocols.
3.3.8 MACSEC and MKA Configuration
The detailed steps to configure MKA, configure MACsec and MKA on interfaces are listed in
[17] - http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/macsec/configuration/xe-16/macsec-xe-
16-book/wan-macsec-mka-support-enhance.html#d74e990a1635
Note: For 256-bit encryption, the key-string length will be 64-characters. For 128-bit encryption,
the key-string length will be 32 characters.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ISR 4000 series and is the answer not in the manual?

Cisco ISR 4000 series Specifications

General IconGeneral
BrandCisco
ModelISR 4000 series
CategoryNetwork Router
LanguageEnglish

Related product manuals