
Extranet VPN Business Scenario 4-13
Configuring IPSec and IPSec Tunnel Mode
Verifying Crypto Access Lists
To verify the configuration:
• Enter the show access-lists 111 EXEC command to see access list’s attributes.
hq-sanjose# show access-lists 111
Extended IP access list 111
permit ip host 10.2.2.2 host 10.1.5.3
Tips
If you have trouble, make sure you are specifying the correct access list number.
Defining Transform Sets and Configuring IPSec Tunnel Mode
To define a transform set and configure IPSec tunnel mode, complete the following steps
starting in global configuration mode:
Step Command Purpose
1
hq-sanjose(config)# crypto ipsec
transform-set proposal4 ah-sha-hmac
esp-des esp-sha-hmac
Define a transform set and enter crypto-transform
configuration mode. This example combines AH
1
transform ah-sha-hmac, ESP
2
encryption transform
esp-des, and ESP
2
authentication transform
esp-sha-hmac in the transform set proposal4.
There are complex rules defining which entries you
can use for the transform arguments. These rules are
explained in the command description for the crypto
ipsec transform-set command. You can also use the
crypto ipsec transform-set? command, in global
configuration mode, to view the available transform
arguments.
Kommentare zu diesen Handbüchern