Cisco 7100 Series Especificaciones Pagina 90

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 112
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 89
Step 2—Configuring Encryption and an IPSec Tunnel
Cisco 7100 Series VPN Configuration Guide
4-18
Creating Crypto Map Entries
To create crypto map entries that will use IKE to establish the SAs, complete the following
steps starting in global configuration mode:
Step Command Purpose
1
hq-sanjose(config)# crypto map s4second
local-address serial 2/0
Create the crypto map and specify a
local address (physical interface) to be
used for the IPSec traffic. This example
creates crypto map s4second and
specifies serial interface 2/0 of the
headquarters router as the local address.
2
hq-sanjose(config)# crypto map s4second 2
ipsec-isakmp
Enter crypto map configuration mode,
specify a sequence number for the
crypto map you created in Step 1, and
configure the crypto map to use IKE to
establish SAs. This example configures
sequence number 2 and IKE for crypto
map s4second.
3
hq-sanjose(config-crypto-map)# match address 111
Specify an extended access list. This
access list determines which traffic is
protected by IPSec and which traffic is
not be protected by IPSec. This
example configures access list 111,
which was created in the “Creating
Crypto Access Lists” section on
page 4-12.
4
hq-sanjose(config-crypto-map)# set peer
172.16.2.7
Specify a remote IPSec peer (by host
name or IP address). This is the peer to
which IPSec protected traffic can be
forwarded. This example specifies
serial interface 1/0 (172.16.2.7) on the
business partner router.
Vista de pagina 89
1 2 ... 85 86 87 88 89 90 91 92 93 94 95 ... 111 112

Comentarios a estos manuales

Sin comentarios