Contents
Changing Existing Transforms | 4 - 8 |
|
| |||
Transform Example | 4 - 8 |
|
|
|
| |
Configuring IPSec | 4 - 8 |
|
|
|
|
|
Ensuring That Access Lists Are Compatible with IPSec | 4 - 8 | |||||
Setting Global Lifetimes for IPSec Security Associations | 4 - 8 | |||||
Creating Crypto Access Lists | 4 - 10 |
|
|
| ||
Creating Crypto Map Entries | 4 - 10 |
|
|
| ||
Creating Dynamic Crypto Maps 4 - 12 |
|
| ||||
Applying Crypto Map Sets to Interfaces | 4 - 14 |
| ||||
Monitoring and Maintaining IPSec | 4 - 14 |
|
| |||
Verifying IKE and IPSec Configurations | 4 - 15 |
|
| |||
Verifying the Configuration 4 - 16 |
|
|
| |||
Configuration Examples | 4 - 18 |
|
|
|
| |
Configuring IKE Policies Example | 4 - 18 |
|
|
| ||
Configuring IPSec Configuration Example | 4 - 18 |
| ||||
Basic IPSec Configuration Illustration | 4 - 19 |
|
|
| ||
Router A Configuration | 4 - 19 |
|
|
|
| |
Router B Configuration | 4 - 20 |
|
|
|
| |
Troubleshooting Tips | 4 - 21 |
|
|
|
|
|
Monitoring and Maintaining the VSA | 4 - 23 |
|
|
| ||
Using Deny Policies in Access Lists | 4 - 23 |
|
| |||
Configuration Guidelines and Restrictions | 4 - 24 |
| ||||
Monitor and Maintenance Commands | 4 - 24 |
|
|
I N D E X
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
| v | |
|