Chapter 6 Configuring a VPN Using Easy VPN and an IPsec Tunnel

Apply Mode Configuration to the Crypto Map

 

Command or Action

Purpose

Step 4

 

 

domain name

Specifies group domain membership.

 

Example:

 

 

 

Router(config-isakmp-group)# domain

 

 

company.com

 

 

 

Router(config-isakmp-group)#

 

Step 5

 

 

 

exit

 

Exits IKE group policy configuration mode, and

 

 

 

enters global configuration mode.

 

Example:

 

 

 

Router(config-isakmp-group)# exit

 

 

Router(config)#

 

Step 6

 

 

ip local pool {default poolname}

Specifies a local address pool for the group.

 

[low-ip-address [high-ip-address]]

For details about this command and additional

 

 

 

 

Example:

 

parameters that can be set, see the Cisco IOS Dial

 

 

Technologies Command Reference.

 

 

 

 

Router(config)# ip local pool dynpool

 

 

30.30.30.20

30.30.30.30

 

 

Router(config)#

 

 

 

 

 

Apply Mode Configuration to the Crypto Map

Perform these steps to apply mode configuration to the crypto map, beginning in global configuration mode:

 

Command or Action

Purpose

Step 1

 

 

crypto map map-nameisakmp authorization list

Applies mode configuration to the crypto map and

 

list-name

enables key lookup (IKE queries) for the group

 

 

policy from an authentication, authorization, and

 

Example:

accounting (AAA) server.

 

Router(config)# crypto map dynmap isakmp

 

 

authorization list rtr-remote

 

 

Router(config)#

 

Step 2

 

 

crypto map tag client configuration address

Configures the router to reply to mode

 

[initiate respond]

configuration requests from remote clients.

 

Example:

 

 

Router(config)# crypto map dynmap client

 

 

configuration address respond

 

 

Router(config)#

 

 

 

 

Cisco Secure Router 520 Series Software Configuration Guide

 

OL-14210-01

6-5

 

 

 

Page 69
Image 69
Cisco Systems 520 series manual Apply Mode Configuration to the Crypto Map