
Step 2—Configuring Encryption and an IPSec Tunnel
Cisco 7100 Series VPN Configuration Guide
4-12
5 Defining Transform Sets and Configuring IPSec Tunnel Mode
6 Verifying Transform Sets and IPSec Tunnel Mode
Note IKE uses User Datagram Protocol (UDP) port 500. The IPSec encapsulating
security payload (ESP) and authentication header (AH) protocols use IP protocol numbers
50 and 51. Ensure that your access lists are configured so that IP protocol 50, 51, and UDP
port 500 traffic is not blocked at interfaces used by IPSec. In some cases, you might need
to add a statement to your access lists to explicitly permit this traffic.
Creating Crypto Access Lists
Crypto access lists are used to define which IP trafficwill beprotected by crypto and which
traffic will not beprotected bycrypto. (These accesslists arenot the sameas regular access
lists, which determine what traffic to forward or block at an interface.) For example, you
can create access lists to protect all IP traffic between the headquarters router and business
partner router.
The access lists themselves are not specific to IPSec. It is the crypto map entry referencing
the specific access list that defines whether IPSec processing is applied to the traffic
matching a permit in the access list.
To create crypto a access list, enter the following command in global configuration mode:
Command Purpose
hq-sanjose(config)# access-list 111 permit
ip host 10.2.2.2 host 10.1.5.3
Specify conditions to determine which IP packets are
protected.
1
(Enable or disable crypto for traffic that
matches these conditions.) This example configures
access list 111 to encrypt all IP traffic between the
headquarters Web server (translated inside global IP
address 10.2.2.2) and PC B (IP address 10.1.5.3) in the
business partner office.
We recommend that you configure “mirror image” crypto
access lists for use by IPSec and that you avoid using the
any keyword.
1 You specify conditions using an IP access list designated by either a number or a name. The access-list command designates a
numbered extended access list; the ip access-list extended command designates a named access list.
Comentarios a estos manuales