Cisco 520-T1 Software Guide - Page 69

Example:, Apply Mode Configuration to the Crypto Map

Page 69 highlights

Chapter 6 Configuring a VPN Using Easy VPN and an IPsec Tunnel Apply Mode Configuration to the Crypto Map Step 4 Command or Action domain name Example: Router(config-isakmp-group)# domain company.com Router(config-isakmp-group)# Step 5 exit Example: Router(config-isakmp-group)# exit Router(config)# Step 6 ip local pool {default | poolname} [low-ip-address [high-ip-address]] Example: Router(config)# ip local pool dynpool 30.30.30.20 30.30.30.30 Router(config)# Purpose Specifies group domain membership. Exits IKE group policy configuration mode, and enters global configuration mode. Specifies a local address pool for the group. For details about this command and additional parameters that can be set, see the Cisco IOS Dial Technologies Command Reference. Apply Mode Configuration to the Crypto Map Perform these steps to apply mode configuration to the crypto map, beginning in global configuration mode: Step 1 Command or Action Purpose crypto map map-name isakmp authorization list list-name Example: Applies mode configuration to the crypto map and enables key lookup (IKE queries) for the group policy from an authentication, authorization, and accounting (AAA) server. Router(config)# crypto map dynmap isakmp authorization list rtr-remote Router(config)# Step 2 crypto map tag client configuration address [initiate | respond] Configures the router to reply to mode configuration requests from remote clients. Example: Router(config)# crypto map dynmap client configuration address respond Router(config)# OL-14210-01 Cisco Secure Router 520 Series Software Configuration Guide 6-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

6-5
Cisco Secure Router 520 Series Software Configuration Guide
OL-14210-01
Chapter 6
Configuring a VPN Using Easy VPN and an IPsec Tunnel
Apply Mode Configuration to the Crypto Map
Apply Mode Configuration to the Crypto Map
Perform these steps to apply mode configuration to the crypto map, beginning in global configuration
mode:
Step 4
domain
name
Example:
Router(config-isakmp-group)#
domain
company.com
Router(config-isakmp-group)#
Specifies group domain membership.
Step 5
exit
Example:
Router(config-isakmp-group)#
exit
Router(config)#
Exits IKE group policy configuration mode, and
enters global configuration mode.
Step 6
ip local pool
{
default
|
poolname
}
[
low-ip-address
[
high-ip-address
]]
Example:
Router(config)#
ip local pool dynpool
30.30.30.20 30.30.30.30
Router(config)#
Specifies a local address pool for the group.
For details about this command and additional
parameters that can be set, see the
Cisco IOS Dial
Technologies Command Reference
.
Command or Action
Purpose
Command or Action
Purpose
Step 1
crypto map
map-name
isakmp authorization list
list-name
Example:
Router(config)#
crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an authentication, authorization, and
accounting (AAA) server.
Step 2
crypto map
tag
client configuration address
[
initiate | respond
]
Example:
Router(config)#
crypto map dynmap client
configuration address respond
Router(config)#
Configures the router to reply to mode
configuration requests from remote clients.