Cisco 520-T1 Software Guide - Page 69
Example:, Apply Mode Configuration to the Crypto Map
UPC - 882658299889
View all Cisco 520-T1 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 69 highlights
Chapter 6 Configuring a VPN Using Easy VPN and an IPsec Tunnel Apply Mode Configuration to the Crypto Map Step 4 Command or Action domain name Example: Router(config-isakmp-group)# domain company.com Router(config-isakmp-group)# Step 5 exit Example: Router(config-isakmp-group)# exit Router(config)# Step 6 ip local pool {default | poolname} [low-ip-address [high-ip-address]] Example: Router(config)# ip local pool dynpool 30.30.30.20 30.30.30.30 Router(config)# Purpose Specifies group domain membership. Exits IKE group policy configuration mode, and enters global configuration mode. Specifies a local address pool for the group. For details about this command and additional parameters that can be set, see the Cisco IOS Dial Technologies Command Reference. Apply Mode Configuration to the Crypto Map Perform these steps to apply mode configuration to the crypto map, beginning in global configuration mode: Step 1 Command or Action Purpose crypto map map-name isakmp authorization list list-name Example: Applies mode configuration to the crypto map and enables key lookup (IKE queries) for the group policy from an authentication, authorization, and accounting (AAA) server. Router(config)# crypto map dynmap isakmp authorization list rtr-remote Router(config)# Step 2 crypto map tag client configuration address [initiate | respond] Configures the router to reply to mode configuration requests from remote clients. Example: Router(config)# crypto map dynmap client configuration address respond Router(config)# OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide 6-5