Configuring Ipsec Tunnel Between Avaya 96Xx Series Ip Phone With VPN and Cisco 2811 Isr Router - Issue 0.4
Configuring Ipsec Tunnel Between Avaya 96Xx Series Ip Phone With VPN and Cisco 2811 Isr Router - Issue 0.4
Configuring Ipsec Tunnel Between Avaya 96Xx Series Ip Phone With VPN and Cisco 2811 Isr Router - Issue 0.4
Configuring IPSec Tunnel between Avaya 96xx Series IP Phone with VPN and Cisco 2811 ISR Router Issue 0.4
Abstract
These Application Notes present a sample configuration for a remote user with an Avaya 96xx Phone with VPN (IPSec) whereby the IPSec Tunnel is terminated in the main office location with a Cisco 2811 Intergraded Service Router. For the sample configuration, the Avaya 96xx Series IP Phone with VPN once completed the tunnel negotiation will register to Avaya Aura Communication Manager 5.2 with H.323 protocol.
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
1 of 28 96xxVPNCiscoISR
Table of Contents
Table of Contents............................................................................................................................ 2 1. Introduction............................................................................................................................. 3 2. Equipment and Software Validated ........................................................................................ 4 3. Configure Communication Manager ...................................................................................... 5 3.1. IP Codec Sets Configuration........................................................................................... 5 3.2. IP Network Map Configuration ...................................................................................... 7 3.3. Configure IP Network Region ........................................................................................ 7 3.4. Adding station for remote user ....................................................................................... 9 3.5. Save Translations .......................................................................................................... 10 4. Avaya 96xx Series IP Phone Configuration ......................................................................... 11 4.1. 96xx Series IP Phone Firmware.................................................................................... 11 4.2. Configuring Avaya 96xx Series IP Phone .................................................................... 11 4.2.1. During Telephone Boot......................................................................................... 12 4.2.2. Phone is operational in VPN enabled Mode. ........................................................ 13 4.3. Sample 46xxsettings.txt file.......................................................................................... 14 5. Configure Cisco 2811 ISR .................................................................................................... 18 5.1. Enable authentication, authorization and accounting (AAA) ....................................... 19 5.2. Create users in the local database ................................................................................. 19 5.3. Create an ISAKMP policy ............................................................................................ 20 5.4. Create a group along with pre-shared key for authentication ....................................... 20 5.5. Create Phase 2 policy for data encryption .................................................................... 21 5.6. Create a dynamic map................................................................................................... 21 5.7. Create a crypto map ...................................................................................................... 21 5.8. Apply Crypto map on the outside interface .................................................................. 22 5.9. Create a pool of addresses to be assigned to VPN Clients ........................................... 22 5.10. Save Configuration Changes..................................................................................... 22 6. Verification Steps.................................................................................................................. 23 6.1. Communication Manager Verification ......................................................................... 23 6.2. Verification on the Cisco ISR ....................................................................................... 24 7. Troubleshooting .................................................................................................................... 25 7.1. IKE Phase 1 no response............................................................................................... 25 7.2. Incorrect IKE Phase 2 ................................................................................................... 25 7.3. Invalid Username, password:........................................................................................ 26 7.4. Invalid IKEID and PSK: ............................................................................................... 26 7.5. Phone displaying connecting................................................................................. 26 7.6. Need IKE ID/PSK Message: ..................................................................................... 26 7.7. No gateway address: ..................................................................................................... 26 8. Conclusion ............................................................................................................................ 26 9. References............................................................................................................................. 27
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
2 of 28 96xxVPNCiscoISR
1. Introduction
These Application Notes describe the steps to configure the Cisco Integrated Service Router (ISR) to support IPSec VPN (Virtual Private Network) tunnel termination using XAuth (eXtended Authentication) and local credential authentication for Avaya 96xx Series IP Phone. The Avaya 96xx Series IP Phone is software based IPSec Virtual Private Network (VPN) client integrated into the firmware of an Avaya 96xx Series IP Phone. This capability allows Avaya IP Telephone to be plugged in and used over a secure IPSec VPN connection from any broadband Internet connection. End users experience the same IP telephone features as if they were using the telephone in the office. Avaya IP telephone models supporting the Avaya 96xx Series IP Phone firmware include the 9620, 9620C, 9620L, 9630, 9640, 9650, 9650C and 9670. Note: Avaya 9610 does not support VPN. Release 3.1 of the Avaya 96xx Series IP Phone firmware, used in these Application Notes, extends the support of VPN gateways to include Cisco ISR family with the proper IPSec features enabled. The configuration steps described in these Application Notes utilize a Cisco ISR 2811. The sample network implemented for these Application Notes is shown in Figure 1.
S8730
POWER SU PPLY POWER
PP M
SU PPLY
DIMMS
D IMMS
PR OC PR OC
Avaya one-X
IN TER LOCK OVER TEMP I-PPM
FAN S
UID
CO MPACT
R O M
S8730
PO W ER SU PPLY POW ER
PP M
PCI R ISER C AG E
OK
MESSAGE PHONE
SU PPL Y
DIMMS
D IMMS
PR OC PR OC
CONTACTS
F AN S IN TER L O CK O VER T EMP I-PPM
MENU A BC
CA LL LOG DEF
., @
1
GHI
2
JKL
3
MNO
UID
CO MPACT
4
PQ RS
5
TUV
6
WX YZ
R O M
8 0
[
9 #
*
SPE AKER MUTE
VOLUM E
HEA DSET
Avaya one-X
OK
MESSAGE PH ONE
CONTACTS
MENU ABC
. ,@
1
GH I
2
J KL
3
MNO
4
PQRS
5
TUV
6
WXYZ
8
[
9 #
*
SPEAKER MUTE
VOLUME
HEADSE T
Avaya one-X
Avaya one-X
OK
MESSAG E PHONE
CONTACTS
MENU ABC
., @
OK
MESSAG E PHONE
1
GHI
2
JKL
3
MNO
4
PQRS
5
T UV
6
WXYZ
7
CONTACTS MENU ABC CALL LOG DEF
8
[
9 #
.,@
1
G HI
2
JKL
3
MNO
*
SPEAKER MUT E
4
PQRS
5
T UV
6
WXYZ
VOLUME
HEADSET
8 0
[
9 #
*
SPEAKER MUT E
VOLUM E
HEADSET
Figure 1 Test Configuration used in these Application Notes The Headquarter location contains the Cisco ISR functioning as VPN head-end. In the same datacenter, the Avaya Aura Communication Manager and Web server for Phone Configuration File Server are located.
MB; Reviewed: RRR m/d/y Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved. 3 of 28 96xxVPNCiscoISR
The Avaya 96xx Series IP Phones are located in public network and configured to establish an IPSec tunnel to the External (Fa0/1) IP address of the Cisco ISR. Upon successful authentication of the user, the Cisco ISR assigns IP addresses from a specified IP pool. The assigned IP addresses also known as the inner addresses will be used by the Avaya 96xx Series IP Phone when communicating inside the IPSec tunnel and the corporate network to Avaya Aura Communication Manager. Once the IPSec tunnel is established the Avaya 96xx Series Phone, access the Web server to retrieve its configuration and then initiates an H323 registration with Avaya Aura Communication Manager. Communication Manager runs on an Avaya S8730 Server with Avaya G650 Media Gateway. The results in these Application Notes are applicable to other Communication Manager Servers and Media Gateway combinations. In regards to the Cisco ISR configuration presented, these should work on different models as long as they provide the same feature set. Please consult the vendor.
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
4 of 28 96xxVPNCiscoISR
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
5 of 28 96xxVPNCiscoISR
For the Avaya 96xx Series IP Phone with VPN a different codec set is used. Use the command change ip-codec-set n command where n is codec set used in the configuration. Enter the following values: Audio Codec: set for G.729 needed to support 96xx Series IP Phones with VPN Silence Suppression: Retain the default value n. Frames Per Pkt: Enter 3. Packet Size (ms): Enter 30 The following screenshot shows the configuration of ip-codec-set 4 for the VPN users and Phones.
change ip-codec-set 4 IP Codec Set Codec Set: 4 Audio Codec 1: G.729 2: Silence Suppression n Frames Per Pkt 3 Packet Size(ms) 30 Page 1 of 2
Use list ip-codec-set command to verify the codec assignments, as shown in the following screen capture.
list ip-codec-set IP CODEC SETS Codec Set 1 2 3 4 Codec 1 Codec 2 Codec 3 Codec 4 Codec 5
G.711MU
G.729
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
6 of 28 96xxVPNCiscoISR
Repeat the configuration for the IP Network region assigned to 96xx Series IP Phone with VPN. In our Application Notes IP network region 2 was assigned for the purpose.
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
7 of 28 96xxVPNCiscoISR
Page
1 of
19
Region: 2 Location: 1 Authoritative Domain: avaya.com Name: HomeUsers MEDIA PARAMETERS Intra-region IP-IP Direct Audio: yes Codec Set: 4 Inter-region IP-IP Direct Audio: yes UDP Port Min: 2048 IP Audio Hairpinning? n UDP Port Max: 3329
Navigate to Page 3 and ensure that the codec set 4 defined previously, is used when connecting calls to dst region 1 and 2.
change ip-network-region 2 Source Region: 2 Page 3 of 19 I G A R n M e a s
dst codec direct WAN-BW-limits Video Intervening rgn set WAN Units Total Norm Prio Shr Regions 1 4 y NoLimit 2 4
A G L all all
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
8 of 28 96xxVPNCiscoISR
STATION OPTIONS Loss Group: 19 Speakerphone: Display Language: Survivable GK Node Name: Survivable COR: Survivable Trunk Dest? 2-way english internal y 1 20050 y 0
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
9 of 28 96xxVPNCiscoISR
In the next page, enable media shuffling by selecting Direct IP-IP Audio Connection? y .
display station 20050 STATION FEATURE OPTIONS LWC Reception: LWC Activation? LWC Log External Calls? none CDR Privacy? Redirect Notification? Per Button Ring Control? Bridged Call Alerting? Active Station Ringing: H.320 Conversion? Service Link Mode: Multimedia Mode: MWI Served User Type: spe y n n y n n single Auto Select Any Idle Appearance? n Coverage Msg Retrieval? y Auto Answer: Data Restriction? Idle Appearance Preference? Bridged Idle Line Preference? Restrict Last Appearance? n n n y Page 2 of 5
EMU Login Allowed? n n Per Station CPN - Send Calling Number? y as-needed EC500 State: disabled enhanced sip-adjunct Display Client Redirection? n Select Last Used Appearance? n Coverage After Forwarding? s Multimedia Early Answer? n Remote Softphone Emergency Calls:as-on-local Direct IP-IP Audio Connections?y Emergency Location Ext: 20050 Always Use? n IP Audio Hairpinning? n
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
10 of 28 96xxVPNCiscoISR
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
11 of 28 96xxVPNCiscoISR
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
12 of 28 96xxVPNCiscoISR
The configuration values of one of the 96xx Series IP Phones used in the sample configurations are shown in Table 3 below. No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Option VPN : VPN Vendor: Value
Enabled Cisco 172.16.1.1 (External interface IP address of VPN Gateway Address: gateway) External Router: 0.0.0.0 (Or provided by dhcp from home Network). External Phone IP Address: 0.0.0.0 (Or Same as above). External Subnet Mask: 0.0.0.0 (Or Same as above). External DNS Server: (Provided by Service provider). Encapsulation : 4500-4500 Copy TOS: No Auth. Type: PSK with XAUTH VPN User Type: Any VPN User: (VPN username i.e. testphone2 as per our notes) Password Type: Save in Flash ****** (i.e. Remote password i.e. vpnpass as per our User Password: notes). IKE ID (Group Name): (Group name i.e. groupauthor as per our notes). ********* (The preshared key defined in the gateway, Pre-Shared Key (PSK) vpnvpn as per our notes). IKE ID Type: KEY_ID IKE Xchg Mode: Aggressive. IKE DH Group: 2 IKE Encryption Alg: Any IKE Auth. Alg. : Any IKE Config. Mode: Enabled IPsec PFS DH Group: 2 IPsec Encryption Alg: Any IPsec Auth. Alg.: Any Protected Network: 0.0.0.0/0 IKE Over TCP: Never Table 3 - VPN settings
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
13 of 28 96xxVPNCiscoISR
## ## YES 1 ## NO 2 ## ************************************************ SET NVVPNCOPYTOS 2 ##************************************************* ## User Type ## Any 1 ## 1 User 2 ##************************************************* SET NVVPNUSERTYPE 1 ## ## ## ## ## ## ## ************************************************ user Id & password if left blank, the first time starts the vpn negotiation, the phone will prompt the username and password and time and save in memory ************************************************ SET NVVPNUSER "testphone2"
## ************************************************ ## Password type ## ## Save in flash 1 ## Erase on power-off 2 ## Numeric OTP 3 ## Alpha-Numeric OTP 4 ## PASSWORD_TYPE_ERASE_ON_VPN_TERMINATION 5 ## ************************************************ SET NVVPNPSWDTYPE 1 ## ************************************************ ## Group name / ike id ## ************************************************ SET NVIKEID "groupauthor" ## ************************************************ ## Group PSK ## ************************************************ SET NVIKEPSK "vpnvpn" ## ************************************************ ## IKE ID Type ## ## IP-Address 1 ## FQDN 2 ## USER-FQDN 3 ## DER-ASN 9 ## KEY-ID 11 ## ************************************************ SET NVIKEIDTYPE 11 ## ************************************************ ## Ike exchange mode ## MB; Reviewed: RRR m/d/y Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved. 15 of 28 96xxVPNCiscoISR
## Aggressive 1 ## Main mode 2 ## ************************************************ SET NVIKEXCHGMODE 1 ## ************************************************ ## IKE DH group set ## DH Group 1 1 ## DH Group 2 2 ## DH Group 5 5 ## DH Group 14 14 ## DH Group 15 15 ## DH Group Detect 254 ## ************************************************ SET NVIKEDHGRP 2 ## ************************************************ ## IKE Encryption Algorithm ## ## ANY 0 ## AES-128 1 ## 3DES 2 ## DES 3 ## AES-192 4 ## AES-256 5 ## ************************************************ SET NVIKEP1ENCALG 0 ## ************************************************ ## IKE Authentication Algorithm ## ## ANY 0 ## MD5 1 ## SHA1 2 ## ************************************************ SET NVIKEP1ENCALG 0 ## ************************************************ ## IKE config mode ## ## Enabled 1 ## Disabled 2 ## ************************************************ SET NVIKECONFIGMODE 1 ## ************************************************ ## IPsec DH group set ## ## DH Group 1 1 ## DH Group 2 2 ## DH Group 5 5 ## DH Group 14 14 ## DH Group 15 15 ## DH Group Detect 254 ## ************************************************ SET NVPFSDHGRP 2 MB; Reviewed: RRR m/d/y Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved. 16 of 28 96xxVPNCiscoISR
## ************************************************ ## IPsec Encryption Algorithm ## ## ANY 0 ## AES-128 1 ## 3DES 2 ## DES 3 ## AES-192 4 ## AES-256 5 ## ************************************************ SET NVIKEP2ENCALG 0 ## ************************************************ ## IPsec Authentication Algorithm ## ## ANY 0 ## MD5 1 ## SHA1 2 ## ************************************************ SET NVIKEP2AUTHALG 0 ## ************************************************ ## IKE over TCP ## ## IKE_OVER_TCP_NEVER 0 ## IKE_OVER_TCP_AUTO 1 ## IKE_OVER_TCP_ALWAYS 2 ## ************************************************* SET NVIKEOVERTCP 0 ## ************************************************* ## VPNCODE ## ************************************************* SET VPNCODE "876" ## Craft code ## ************************************************* SET PROCPSWD 27238 ## ************************************************* ## VPNPROC ## Valid Values: 1 ASCII numeric digit,0,1 or 2 ## Description: Specifies whether VPNCODE can be used ## to access the VPN procedure at all, in ## view-only mode, or in view/modify mode ## ************************************************* SET VPNPROC 2
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
17 of 28 96xxVPNCiscoISR
This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to [email protected]. Cisco 2811 (revision 53.51) with 247808K/14336K bytes of memory. Processor board ID FHK1306F476 2 FastEthernet interfaces 2 Channelized (E1 or T1)/PRI ports 1 Virtual Private Network (VPN) Module 4 Voice FXO interfaces DRAM configuration is 64 bits wide with parity enabled. 239K bytes of non-volatile configuration memory. 125440K bytes of ATA CompactFlash (Read/Write) Configuration register is 0x2102
As prerequisite it is needed to negotiate with network administrator an IP pool for the VPN clients, routable inside the organization implementing the VPN gateway. In these application
MB; Reviewed: RRR m/d/y Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved. 18 of 28 96xxVPNCiscoISR
notes the 10.10.98.0/24 network was assigned for the purpose. In order implement IPSec VPN head end on the Cisco ISR the following configuration as to be performed. Enable Authentication Authorization and Accounting Create users in the local database Create an Internet Security Association and Key Management Protocol (ISAKMP) for Phase 1 negotiation Create a group along with pre-shared key for authentication Create Phase 2 policy for data encryption Create a dynamic map Create a crypto map Apply Crypto map on the outside interface Create a pool of addresses to be assigned to VPN Clients
local specifies user authentication to be used to use against the local database.
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
19 of 28 96xxVPNCiscoISR
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
20 of 28 96xxVPNCiscoISR
Allow the system to recover from invalid spi event with the command:
crypto isakmp invalid-spi-recovery
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
21 of 28 96xxVPNCiscoISR
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
22 of 28 96xxVPNCiscoISR
6. Verification Steps
6.1. Communication Manager Verification
From the Avaya Communication SAT terminal, use the command list registered-ip-stations to show that the VPN phones are registered with Communication Manager with their inner IP address assigned from the address pool on Cisco 2811 ISR.
list registered-ip-stations REGISTERED IP STATIONS Station Ext or Orig Port ------------20036 20040 20041 20050 20051 Set Type/ Prod ID/ TCP Station IP Address/ Net Rgn Release Skt Gatekeeper IP Address --------- ---------- --- -------------------------------------9620 1 9630 1 9630 1 9640 2 9650 2 IP_Phone 3.1000 IP_Phone 3.1000 IP_Phone 3.1000 IP_Phone 3.1000 IP_Phone 3.1000 y y y y y 135.64.186.144 135.64.186.7 135.64.186.147 135.64.186.6 135.64.186.155 135.64.186.7 10.10.98.65 135.64.186.7 10.10.98.70 135.64.186.7
Make a call from the VPN phone1 (20050) to the VPN phone2 (20051). Use the command status station x (x represent the extension number) to verify the status of the VPN Phone as shown below. Notice on Page 1, the VPN phone1 status is in-service/off-hook
status station 20050 Administered Type: Connected Type: Extension: Port: Page 1 of 8 GENERAL STATUS Service State: in-service/off-hook TCP Signal Status: connected Parameter Download: complete
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
23 of 28 96xxVPNCiscoISR
Page 4, the VPN phone uses IP address 10.10.98.65, which is assigned from the IP address pool defined on the Cisco 2811 ISR. Note that the IP address 135.64.186.7 is C-LAN IP address and is in Region 1 as shown below.
status station 20050 CALL CONTROL SIGNALING Port: S00054 Switch-End IP Signaling Loc: 01B0317 IP Address Port Switch-End: 135.64.186.7 1720 Set End: 10.10.98.65 3437 H.245 Near: H.245 Set: Page 4 of 8
Rgn 1 2
Page 5 shows that the audio is between the two VPN phones and the Audio Connection Type is ip-direct (shuffling).
status station 20050 AUDIO CHANNEL Port: S00054 Switch-End Audio Location: IP Address Port Other-End: 10.10.98.70 2878 Set-End: 10.10.98.65 3124 Audio Connection Type: ip-direct G.729A Page 5 of 8
Node Name
Rgn 2 2
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
24 of 28 96xxVPNCiscoISR
7. Troubleshooting
This section offers some common configuration mismatches between the 96xx Series IP Phone and the Cisco ISR to assist in troubleshooting. The key events of the logs are highlighted in bold. Cisco ISR log messages can be accessed through the command line interface.
By pressing the Retry Soft key again it will attempt to reestablish the tunnel. If the Details Soft key it is pressed, the phone display shows the IKE Phase 1 no response IKE Phase 1 no response Restart Program Back
If the Program soft key it is pressed, it will redirect to the Craft Code Screen Enter Code: #=OK Given the correct Craft Code, it will redirect to Craft Procedures Screen. From here select VPN and press Start soft key. Press forward soft key on the phone and check the IKE Exchange mode, check IKE Phase1 parameters on VPN gateway and phone is correct
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
25 of 28 96xxVPNCiscoISR
If we press the Retry soft key again it will attempt to reestablish the tunnel. If we press the Details soft key we can see Invalid configuration screen. Invalid configuration Restart Program Back
If we press the Program soft key it will redirect to Craft Code Screen Enter Code: # = OK Given the correct procpswd, and it will redirect to the local configuration Procedures Screen. Here select VPN and press Start soft key Press forward soft key on the phone and it will go to IKE Phase 2 Screen, here check that the IKE Phase 2 Screen Settings are correct or not.
8. Conclusion
As illustrated in these Application Notes, the Avaya 96xx Series IP Phone, combined with Cisco ISR 2811, using the IPSec VPN, provides a secure solution for remote worker telephony over
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
26 of 28 96xxVPNCiscoISR
any broadband Internet connection. The Avaya 96xx Series IP Phone demonstrated successful interoperability with the Cisco ISR 2811 Router.
9. References
Avaya references, available at http://support.avaya.com Avaya Aura Communication Manager: 1. Administering Avaya Aura Communication Manager, Doc ID 03-300509 Avaya 9600 Series IP Telephone: 2. Avaya one-X Deskphone Edition for 9600 Series IP Telephones Administrator Guide Release 3.1, Doc ID 16-300698 3. Avaya VPN Setup Guide for 9600 Series IP Telephones Release 3.1, Doc ID 16602968 Cisco references, available at http://www.cisco.com 4. Configuring Cisco VPN Client 3.x for Windows to IOS Using Local Extended Authentication Document ID 20621 5. Cisco IOS Debug Command Reference http://www.cisco.com/en/US/docs/ios/debug/command/reference/db_book.html 6. Cisco IOS Security Command Reference http://www.cisco.com/en/US/docs/ios/security/command/reference/sec_book.html
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
27 of 28 96xxVPNCiscoISR
Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by and are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. The information provided in these Application Notes is subject to change without notice. The configurations, technical data, and recommendations provided in these Application Notes are believed to be accurate and dependable, but are presented without express or implied warranty. Users are responsible for their application of any products specified in these Application Notes. Please e-mail any questions or comments pertaining to these Application Notes along with the full title name and filename, located in the lower right corner, directly to the Avaya Solution & Interoperability Test Lab at [email protected]
Solution & Interoperability Test Lab Application Notes 2009 Avaya Inc. All Rights Reserved.
28 of 28 96xxVPNCiscoISR