
23-11
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 23 Configuring IPSec and ISAKMP
Configuring IPSec
Using the Tunnel-group-map default-group Command
This command specifies a default tunnel group to use when the name cannot be derived by other
configured methods.
The syntax is tunnel-group-map [rule-index] default-group tunnel-group-name where the rule-index
is the priority for the rule, and tunnel-group name must be for a tunnel group that already exists.
Configuring IPSec
This section provides background information about IPSec and describes the procedures required to
configure the security appliance when using IPSec to implement a VPN. It contains the following topics:
• Understanding IPSec Tunnels, page 23-11
• Understanding Transform Sets, page 23-12
• Defining Crypto Maps, page 23-12
• Applying Crypto Maps to Interfaces, page 23-13
• Using Interface Access Lists, page 23-13
• Changing IPSec SA Lifetimes, page 23-15
• Creating a Basic IPSec Configuration, page 23-16
• Using Dynamic Crypto Maps, page 23-18
• Providing Site-to-Site Redundancy, page 23-20
• Viewing an IPSec Configuration, page 23-20
Understanding IPSec Tunnels
IPSec tunnels are sets of security associations (SAs) that the security appliance establishes between
peers. The SAs define the protocols and algorithms to apply to sensitive data, and also specify the keying
material the peers use. IPSec SAs control the actual transmission of user traffic. SAs are unidirectional,
but are generally established in pairs (inbound and outbound).
The peers negotiate the settings to use for each security SA. Each SA consists of the following:
• Transform sets
• Crypto maps
• Access lists
• Tunnel groups
• Pre fragmentation policies
Comentarios a estos manuales