Cisco 7100 Series Spezifikationen Seite 58

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 112
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 57
Step 3—Configuring Encryption
Cisco 7100 Series VPN Configuration Guide
3-28
Creating Crypto Map Entries
To create a crypto map entry that will use IKE to establish the SAs, complete the following
steps starting in global configuration mode:
Step Command Purpose
1
hq-sanjose(config)# crypto map s1first
local-address serial 1/0
Create the crypto map and specify a
local address (physical interface) to be
used for the IPSec traffic. This example
creates crypto map s1first and specifies
serial interface 1/0 of the headquarters
router as the local address.
2
hq-sanjose(config)# crypto map s1first 1
ipsec-isakmp
Enter crypto map configuration mode,
specify a sequence number for the
crypto map you created in Step 1, and
configure the crypto map to use IKE to
establish SAs. This example configures
sequence number 1 and IKE for crypto
map s1first.
3
hq-sanjose(config-crypto-map)# match address 101
Specify an extended access list. This
access list determines which traffic is
protected by IPSec and which traffic is
not be protected by IPSec. This
example configures access list 101,
which was created in the “Creating
Crypto Access Lists” section on
page 3-21.
4
hq-sanjose(config-crypto-map)# set peer
172.17.2.5
Specify a remote IPSec peer (by host
name or IP address). This is the peer to
which IPSec protected traffic can be
forwarded. This example specifies
serial interface 1/0 (172.17.2.5) on the
remote office router.
Seitenansicht 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63 ... 111 112

Kommentare zu diesen Handbüchern

Keine Kommentare