
23-13
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 23 Configuring IPSec and ISAKMP
Configuring IPSec
Create multiple crypto map entries for a given security appliance interface, if any of the following
conditions exist:
• If different data flows are to be handled by separate peers.
• If you want to apply different IPSec security to different types of traffic (to the same or separate
peers); for example, if you want traffic between one set of subnets to be authenticated, and traffic
between another set of subnets to be both authenticated and encrypted. In this case, the different
types of traffic should have been defined in two separate access lists, and you create a separate
crypto map entry for each crypto access list.
Applying Crypto Maps to Interfaces
You must apply a crypto map set to each interface through which IPSec traffic flows. The security
appliance supports IPSec on all interfaces. Applying the crypto map set to an interface instructs the
security appliance to evaluate all the traffic against the crypto map set and to use the specified policy
during connection or SA negotiation.
Binding a crypto map to an interface also initializes run-time data structures, such as the security
association database and the security policy database. If the crypto map is modified in any way,
reapplying the crypto map to the interface resynchronizes the various run-time data structures with the
crypto map configuration. In addition, any existing connections are torn down and reestablished after the
new crypto map is triggered.
Using Interface Access Lists
By default, the security appliance lets IPSec packets bypass interface ACLs. If you want to apply
interface access lists to IPSec traffic, use the no form of the sysopt connection permit-ipsec command.
The crypto map access list bound to the outgoing interface either permits or denies IPSec packets
through the VPN tunnel. IPSec authenticates and deciphers packets that arrive from an IPSec tunnel, and
subjects them to the crypto ACL match of the tunnel.
Permit and deny have different meanings depending on the type of ACL. When used in an outbound
crypto ACL, permit means “apply IPSec” and deny means “don't apply IPSec.” In an inbound crypto
ACL, permit and deny statements ensure sure that traffic received through the tunnel matches the correct
permit rule.
Access lists define which IP traffic to protect. For example, you can create access lists to protect all IP
traffic between Subnet A and Subnet Y or between Host A and Host B. (These access lists are similar to
access lists used with the access-group command. With the access-group command, the access list
determines which traffic to forward or block at an interface.)
The access lists themselves are not specific to IPSec. It is the crypto map entry referencing the specific
access list that defines whether IPSec processing applies to the traffic matching a permit in the access
list.
Access lists associated with IPSec crypto map entries have four primary functions:
• Select outbound traffic to be protected by IPSec (permit = protect).
• Trigger and ISAKMP negotiation for data travelling without and established SA.
• Process inbound traffic to filter out and discard traffic that should have been protected by IPSec.
Comentarios a estos manuales