C7200 VSA (VPN Services Adapter)
Installation and Configuration Guide
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-9129-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following inform ation is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant
to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not
installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to
comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable
protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digital
devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television
communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its
peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the television or radio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits
controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems,
Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco
Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing,
FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys,
MeetingPlace, MGX, Networking Academy, Network Registrar, Pac k et , PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise, The Fastest Way to Increase
Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0609R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
Router A Configuration4 - 19
Router B Configuration4 - 20
Troubleshooting Tips4 - 21
Monitoring and Maintaining the VSA4 - 23
Using Deny Policies in Access Lists4 - 23
Configuration Guidelines and Restrictions4 - 24
Monitor and Maintenance Commands4 - 24
OL-9129-02
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
v
Contents
vi
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Preface
This preface describes the objectives and organization of this document and explains how to find
additional information on related products and services. This preface contains the following sections:
• Audience, page vii
• Warnings, page vii
• Objectives, page viii
• Organization, page viii
• Related Documentation, page ix
Audience
Warnings
Warning
• Obtaining Documentation, page ix
• Documentation Feedback, page x
• Cisco Product Security Overview, page x
• Product Alerts and Field Notices, page xi
• Obtaining Technical Assistance, page xii
• Obtaining Additional Publications and Information, page xiii
The audience for this publication should be familiar with Cisco router hardware and cabling along with
electronic circuitry and wiring practices. Experience as an electronic or electromechanical technician is
recommended.
To prevent the system from overheating, do not operate it in an area that exceeds the maximum
recommended ambient temperature of: 24°C (75°F).
OL-9129-02
Only trained and qualified personnel should be allowed to install, replace, or service this equipment.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
vii
Objectives
Preface
Warning
Objectives
NoteTo ensure compliance with U.S. export laws and regulations, and to prevent future problems, see the
IMPORTANT SAFETY INSTRUCTIONS
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar
with standard practices for preventing accidents. To see translations of the warnings that appear in
this publication, refer to the translated safety warnings that accompanied this device.
Note: SAVE THESE INSTRUCTIONS
Note: This documentation is to be used in conjunction with the specific product installation guide
that shipped with the product. Please refer to the Installation Guide, Configuration Guide, or other
enclosed additional documentation for further details.
This document contains instructions and procedures for installing and configuring the C7200 VSA (VPN
Services Adapter), a double-width acceleration module supported on the Cisco 7204VXR and
Cisco 7206VXR routers with the NPE-G2 processor.
The part number for the VSA is C7200-VSA(=).
“Compliance with U.S. Export Laws and Regulations Regarding Encryption” section on page 2-5 for
specific, important information.
Organization
This document contains the following chapters:
ChapterTitleDescription
1
2
3
4
OverviewDescribes the VSA and VSA LED displays.
Preparing for InstallationDescribes safety considerations, tools required, and
procedures you should perform before the actual
installation.
Removing and Installing the VSADescribes the procedures for installing and removing
the VSA from the supported platform.
Configuring the VSADescribes procedures needed to configure the VSA in
the Cisco 7200VXR series routers.
viii
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Preface
Related Documentation
This section lists documentation related to your router and its functionality. Because we no longer ship
the entire router documentation set automatically with each system, this documentation is available
online, or on the Documentation CD-ROM.
NoteSelect translated documentation is available at http://www.cisco.com/ by selecting the topic ‘Select a
Location / Language’ at the top of the page.
Some online documentation requires that you are a registered Cisco user. Complete the application at
http://tools.cisco.com/RPF/register/register.do to become a registered Cisco user.
• For hardware installation and maintenance information for the Cisco 7200VXR series routers:
To find the right Cisco IOS software and the amount of memory you need to run the Cisco IOS
features you want to run on your Cisco platform, use the Cisco IOS Software Selection Tool.
Registered Cisco Direct users can access the Cisco IOS Software Selection Tool at:
To find the minimum Cisco IOS software requirements for your router, use the Software
Advisor tool. Registered Cisco Direct users can access the Software Advisor at:
The Product Documentation DVD is a library of technical product documentation on a portable medium.
The DVD enables you to access installation, configuration, and command guides for Cisco hardware and
software products. With the DVD, you have access to the HTML documentation and some of the
PDF files found on the Cisco website at this URL:
http://www.cisco.com/univercd/home/home.htm
The Product Documentation DVD is created and released regularly. DVDs are available singly or by
subscription. Registered Cisco.com users can order a Product Documentation DVD (product number
DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation
Store at this URL:
Preface
http://www.cisco.com/go/marketplace/docstore
Ordering Documentation
You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order
Cisco documentation at the Product Documentation Store at this URL:
http://www.cisco.com/go/marketplace/docstore
If you do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Documentation Feedback
You can provide feedback about Cisco technical documentation on the Cisco Technical Support &
Documentation site area by entering your comments in the feedback form available in every online
document.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
From this site, you will find information about how to do the following:
• Report security vulnerabilities in Cisco products
• Obtain assistance with security incidents that involve Cisco products
• Register to receive security information from Cisco
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
x
OL-9129-02
Preface
A current list of security advisories, security notices, and security responses for Cisco products is
available at this URL:
http://www.cisco.com/go/psirt
To see security advisories, security notices, and security responses as they are updated in real time, you
can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS)
feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:
Cisco is committed to delivering secure products. We test our products internally before we release them,
and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability
in a Cisco product, contact PSIRT:
• For emergencies only— security-alert@cisco.com
An emergency is either a condition in which a system is under active attack or a condition for which
a severe and urgent security vulnerability should be reported. All other conditions are considered
nonemergencies.
Product Alerts and Field Notices
• For nonemergencies —psirt@cisco.com
In an emergency, you can also reach PSIRT by telephone:
• 1 877 228-7302
• 1 408 525-6532
TipWe encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to
encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been
encrypted with PGP versions 2.x through 9.x.
Never use a revoked encryption key or an expired encryption key. The correct public key to use in your
correspondence with PSIRT is the one linked in the Contact Summary section of the Security
Vulnerability Policy page at this URL:
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending
any sensitive material.
Product Alerts and Field Notices
Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field
Notices. You can receive Cisco Product Alerts and Cisco Field Notices by using the Product Alert Tool
on Cisco.com. This tool enables you to create a profile and choose those products for which you want to
receive information.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
xi
Obtaining Technical Assistance
To access the Product Alert Tool, you must be a registered Cisco.com user. (To register as a Cisco.com
user, go to this URL: http://tools.cisco.com/RPF/register/register.do) Registered users can access the
tool at this URL: http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en
Obtaining Technical Assistance
Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The
Cisco Technical Support & Documentation website on Cisco.com features extensive online support
resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center
(TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact
your reseller.
Cisco Technical Support & Documentation Website
The Cisco Technical Support & Documentation website provides online documents and tools for
troubleshooting and resolving technical issues with Cisco products and technologies. The website is
available 24 hours a day at this URL:
Preface
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com
user ID and password. If you have a valid service contract but do not have a user ID or password, you
can register at this URL:
http://tools.cisco.com/RPF/register/register.do
NoteUse the Cisco Product Identification Tool to locate your product serial number before submitting a
request for service online or by phone. You can access this tool from the Cisco Technical Support &
Documentation website by clicking the Tools & Resources link, clicking the All Tools (A-Z) tab, and
then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search
options: by product ID or model name; by tree view; or, for certain products, by copying and pasting
show command output. Search results show an illustration of your product with the serial number label
location highlighted. Locate the serial number label on your product and record the information before
placing a service call.
TipDisplaying and Searching on Cisco.com
If you suspect that the browser is not refreshing a web page, force the browser to update the web page
by holding down the Ctrl key while pressing F5.
To find technical information, narrow your search to look in technical documentation, not the entire
Cisco.com website. On the Cisco.com home page, click the Advanced Search link under the Search box
and then click the Technical Support & Documentation radio button.
xii
To provide feedback about the Cisco.com website or a particular technical document, click Contacts &
Feedback at the top of any Cisco.com web page.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Preface
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and
S4 service requests are those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service Request Tool provides
recommended solutions. If your issue is not resolved using the recommended resources, your service
request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down or severely degraded.)
Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity
definitions.
Severity 1 (S1)—An existing network is “down” or there is a critical impact to your business operations.
You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your
business operations are negatively affected by inadequate performance of Cisco products. You and
Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of the network is impaired while most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
OL-9129-02
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• The Cisco Online Subscription Center is the website where you can sign up for a variety of
Cisco e-mail newsletters and other communications. Create a profile and then select the
subscriptions that you would like to receive. To visit the Cisco Online Subscription Center,
go to this URL:
http://www.cisco.com/offer/subscribe
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
xiii
Obtaining Additional Publications and Information
• The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief
product overviews, key features, sample part numbers, and abbreviated technical specifications for
many Cisco products that are sold through channel partners. It is updated twice a year and includes
the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:
http://www.cisco.com/go/guide
• Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo
merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• Cisco Press publishes a wide range of general networking, training, and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
Preface
• Networking products offered by Cisco Systems, as well as customer support services, can be
obtained at this URL:
http://www.cisco.com/en/US/products/index.html
• Networking Professionals Connection is an interactive website where networking professionals
share questions, suggestions, and information about networking products and technologies with
Cisco experts and other networking professionals. Join a discussion at this URL:
http://www.cisco.com/discuss/networking
• “What’s New in Cisco Documentation” is an online publication that provides information about the
latest documentation releases for Cisco products. Updated monthly, this online publication is
organized by product category to direct you quickly to the documentation for your products. You
can view the latest release of “What’s New in Cisco Documentation” at this URL:
• World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
xiv
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
CHAPTER
1
Overview
This chapter describes the C7200 VSA (VPN Services Adapter) and contains the following sections:
• Data Encryption Overview, page 1-1
• VSA Overview, page 1-2
• Hardware Required, page 1-4
• Features, page 1-4
• Supported Standards, MIBs, and RFCs, page 1-5
• Enabling/Disabling the VSA, page 1-6
• LEDs, page 1-7
• Connectors, page 1-8
• Slot Locations, page 1-8
Data Encryption Overview
This section describes data encryption, including the IPSec, IKE, and certification authority (CA)
interoperability features.
NoteFor additional information on these features, refer to the “IP Security and Encryption” chapter in the
Security Configuration Guide and Security Command Reference publications.
IPSec is a network level open standards framework, developed by the Internet Engineering Task Force
(IETF) that provides secure transmission of sensitive information over unprotected networks such as the
Internet. IPSec includes data authentication, antireplay services and data confidentiality services.
Cisco follows these data encryption standards:
• IPSec—IPSec is an IP layer open standards framework that provides data confidentiality, data
integrity, and data authentication between participating peers. IKE handles negotiation of protocols
and algorithms based on local policy, and generates the encryption and authentication keys to be
used by IPSec. IPSec protects one or more data flows between a pair of hosts, between a pair of
security routers, or between a security router and a host.
OL-9129-02
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-1
VSA Overview
Chapter 1 Overview
• IKE—Internet Key Exchange (IKE) is a hybrid security protocol that implements Oakley and Skeme
key exchanges inside the Internet Security Association and Key Management Protocol (ISAKMP)
framework. IKE can be used with IPSec and other protocols. IKE authenticates the IPSec peers,
negotiates IPSec security associations, and establishes IPSec keys. IPSec can be configured with or
without IKE.
• CA—certification authority (CA) interoperability supports the IPSec standard, using Simple
Certificate Enrollment Protocol (SCEP) and Certificate Enrollment Protocol (CEP). CEP permits
Cisco IOS devices and CAs to communicate to permit your Cisco IOS device to obtain and use
digital certificates from the CA. IPSec can be configured with or without CA. The CA must be
properly configured to issue certificates. For more information, see the “Configuring Certification
Authority Interoperability” chapter of the Security Configuration Guide at
http://www.cisco.com/en/US/products/sw/iosswrel/products_ios_cisco_ios_software_releases.htm
l
The component technologies implemented for IPSec include:
• DES and Triple DES—The Data Encryption Standard (DES) and Triple DES (3DES) encryption
packet data. Cisco IOS implements the 3-key Triple DES and DES-CBC with Explicit IV. Cipher
Block Chaining (CBC) requires an initialization vector (IV) to start encryption. The IV is explicitly
given in the IPSec packet.
• AES—The Advanced Encryption Standard, a next-generation symmetric encryption algorithm, used
by the U.S. Government and organizations outside the U.S.
• MD5 (HMAC variant)—MD5 is a hash algorithm. HMAC is a keyed hash variant used to
authenticate data.
• SHA (HMAC variant)—SHA is a hash algorithm. HMAC is a keyed hash variant used to
authenticate data.
• RSA signatures and RSA encrypted nonces—RSA is the public key cryptographic system developed
by Ron Rivest, Adi Shamir, and Leonard Adleman. RSA signatures provides non-repudiation while
RSA encrypted nonces provide repudiation.
IPSec with the Cisco IOS software supports the following additional standards:
• AH—Authentication Header is a security protocol that provides data authentication and optional
antireplay services.
The AH protocol uses various authentication algorithms; Cisco IOS software has implemented the
mandatory MD5 and SHA (HMAC variants) authentication algorithms. The AH protocol provides
antireplay services.
• ESP—Encapsulating Security Payload, a security protocol, provides data privacy services, optional
data authentication, and antireplay services. ESP encapsulates the data to be protected. The ESP
protocol uses various cipher algorithms and (optionally) various authentication algorithms. Cisco
IOS software implements the mandatory 56-bit DES-CBC with Explicit IV or Triple DES as the
encryption algorithm, and MD5 or SHA (HMAC variants) as the authentication algorithms. The
updated ESP protocol provides antireplay services.
VSA Overview
The C7200 VSA (VPN Services Adapter) is a full-width service adapter (see Figure 1-1) supported in the
I/O slot of the Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-2
OL-9129-02
Chapter 1 Overview
NoteThe C7200 VSA is only supported on the Cisco 7200VXR with the NPE-G2 processor.
VSA Overview
The VSA features hardware acceleration for Advanced Encryption Standard (AES), Data Encryption
Standard (DES), and Triple DES (3DES), providing increased performance for site-to-site and
remote-access IPSec VPN services. The Cisco C7200 VSA solution provides quality of service (QoS),
multicast and multiprotocol traffic, and broad support of integrated LAN/WAN media.
Figure 1-1VSA Module - Front View
12
3
1Screws3Handle
2Status LED light
Figure 1-2VSA Module - Rear Connectors
12
C7200-VSA
148487
1
OL-9129-02
C7200-VSA
148488
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-3
Hardware Required
1Host IO Bus and PCI-X Bus2Power supply
The VSA provides hardware-accelerated support for multiple encryption functions:
• 128/192/256-bit Advanced Encryption Standard (AES) in hardware
• Data Encryption Standard (DES) standard mode with 56-bit key: Cipher Block Chaining (CBC)
• Performance to 900 Mbps encrypted throughput with 300 byte packets and 1000 tunnels
1. As measured with IPSec 3DES HMAC-SHA1 on 1400 byte packets.
1-4
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Chapter 1 Overview
Performance
Supported Standards, MIBs, and RFCs
2. Number of tunnels supported varies based on the total system memory installed.
3. On the NPE-G2, the minimum memory requirement is 1 GB of memory.
Table 1- 2 lists the performance information for the VSA.
Table 1-2Performance for VSA
Cisco RouterThroughput1
Cisco 7200VXR
series routers
with the
NPE-G2
processor
1. As measured with IPSec 3DES or AES Hashed Message Authentication Code (HMAC)-SHA-1 on 1400-byte packets.
Performance varies depending on the number of modules, bandwidth, traffic volume, Cisco IOS software release, and so
forth.
2. Using Cisco 12.4(4)XD3 fc2 image. Performance varies by Cisco IOS software release.
Performance to
900 Mbps
encrypted
throughput
2
Description
Cisco IOS release: 12.4(4)XD3 fc2
7200VXR/NPE-G2/VSA, 1GB system memory
3DES/HMAC-SHA or AES/HMAC-SHA, preshared with no
IKE-keepalive configured
Supported Standards, MIBs, and RFCs
This section describes the standards, Management Information Bases (MIBs), and Request for
Comments (RFCs) supported on the VSA. Requests for Comments (RFCs) contain information about
the supported Internet suite of protocols.
Standards
• IPSec/IKE: RFCs 2401-2411, 2451
MIBs
RFCs
OL-9129-02
• CISCO-IPSEC-FLOW-MONITOR-MIB
• CISCO-IPSEC-MIB
• CISCO-IPSEC-POLICY-MAP-MIB
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules,
go to the Cisco MIB website on Cisco.com at the following URL: