Cisco 7100 Series Spezifikationen Seite 51

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 112
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 50
Intranet VPN Business Scenario 3-21
Configuring IPSec
Creating Crypto Access Lists
Crypto access lists are used to define which IP trafficwill beprotected by crypto and which
traffic will not beprotected bycrypto. (These accesslists arenot the sameas regular access
lists, which determine what traffic to forward or block at an interface.) For example, you
can create access lists to protect all IP traffic between the headquarters router and remote
office router or Telnet traffic between the headquarters router and remote office router.
The access lists themselves are not specific to IPSec. It is the crypto map entry referencing
the specific access list that defines whether IPSec processing is applied to the traffic
matching a permit in the access list.
To create a crypto access list, enter the following command in global configuration mode:
Verifying Crypto Access Lists
To verify the configuration:
Enter the show access-lists 101 EXEC command to see the access list’s attributes.
hq-sanjose# show access-lists 101
Extended IP access list 101
permit gre host 172.17.2.4 host 172.17.2.5
Tips
If you have trouble, make sure you are specifying the correct access list number.
Command Purpose
hq-sanjose(config)# access-list 101 permit
gre host 172.17.2.4 host 172.17.2.5
Specify conditions to determine which IP packets are
protected.
1
(Enable or disable crypto for traffic that
matches these conditions.) This example configures
access list 101 to encrypt all GRE traffic between serial
interface 1/0 on the headquarters router (IP address
172.17.2.4) and serial interface 1/0 on the remote office
router (IP address 172.17.2.5).
1 You specify conditions using an IP access list designated by either a number or a name. The access-list command designates a
numbered extended access list; the ip access-list extended command designates a named access list.
Seitenansicht 50
1 2 ... 46 47 48 49 50 51 52 53 54 55 56 ... 111 112

Kommentare zu diesen Handbüchern

Keine Kommentare