
2-5
Cisco 1710 Security Router Software Configuration Guide
78-12696-01
Chapter 2 Cisco 1710 Security Router Configuration
Configuring IP Security
After this command is executed, it is necessary to perform the following
procedures to bring up all encryption tunnels appropriately.
Step 1 On all involved routers, shut down the interfaces that have crypto maps applied
to them.
Step 2 Enter the following commands on each of the involved routers.
Step 3 Bring up the interfaces on all involved routers that were shut down in Step 1.
To re-enable the VPN module, use the following command:
crypto engine accelerator
An example of its use is as follows:
c1710(config)#crypto engine accelerator
Warning! all current connections will be torn down.
Do you want to continue? [yes|no]:yes
.
switching to crypto accelerator.
The following is a useful command that shows statistical information about the
VPN module:
show crypto engine accelerator statistic
An example of its use is as follows:
c1710#show crypto engine accelerator statistic
C1700_EM:
ds: 0x81784BA4 idb:0x81780560
Command Task
clear crypto sa Clears the security associations applied to the
router.
clear crypto isakmp Clears the active IKE connections to the
router.
show crypto engine connections active Lists the active connections. In this scenario,
it verifies that no connections are active. It
may be necessary to repeat these commands
until no connections are listed.
Kommentare zu diesen Handbüchern