Cisco 7100 Series Especificaciones Pagina 56

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 112
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 55
Step 3—Configuring Encryption
Cisco 7100 Series VPN Configuration Guide
3-26
Configuring Crypto Maps
Crypto map entries created for IPSec pull together the various parts used to set up IPSec
SAs, including:
Which traffic should be protected by IPSec (per a crypto access list).
The granularity of the flow to be protected by a set of SAs.
Where IPSec-protected traffic should be sent (who the remote IPSec peer is).
The local address to be used for the IPSec traffic. (See the “Applying Crypto Maps to
Interfaces” section on page 3-30 for more details.)
What IPSec security should be applied to this traffic(selecting from a list of one or more
transform sets).
Whether SAs are manually established or are established via IKE.
Other parameters that might be necessary to define an IPSec SA.
Crypto map entries with the same crypto map name (but different map sequence numbers)
are grouped into a crypto map set. Later, you willapply these crypto map sets to interfaces;
then, all IP traffic passing through the interface is evaluated against the applied crypto map
set. If a crypto map entry sees outbound IP traffic that should be protected and the crypto
map specifies the use of IKE, a security association is negotiated with the remote peer
according to the parameters included in the crypto map entry; otherwise, if the crypto map
entry specifies the use of manual security associations, a security association should have
already been established via configuration. (If a dynamic crypto map entry sees outbound
traffic that should be protected and no security association exists, the packet is dropped.)
The policy described in the crypto map entries is used during the negotiation of security
associations. If the local router initiates the negotiation, it will use the policy specified in
the static crypto map entries to create the offer to be sent to the specified IPSec peer. If the
IPSec peer initiates the negotiation, the local router will check the policy from the static
crypto map entries, as well as any referenced dynamic crypto map entries to decide whether
to accept or reject the peer’s request (offer).
ForIPSec to succeed between twoIPSec peers, both peers’ crypto map entries must contain
compatible configuration statements.
Vista de pagina 55
1 2 ... 51 52 53 54 55 56 57 58 59 60 61 ... 111 112

Comentarios a estos manuales

Sin comentarios