Chapter 7 Configuring VPNs Using an IPsec Tunnel and Generic Routing Encapsulation

Configure a VPN

 

Command or Action

Purpose

Step 3

 

 

reverse-route

Creates source proxy information for the crypto

 

 

map entry.

 

Example:

See the Cisco IOS Security Command Reference

 

 

 

Router(config-crypto-map)# reverse-route

for details.

 

Router(config-crypto-map)#

 

Step 4

 

 

exit

Enters global configuration mode.

 

Example:

 

 

Router(config-crypto-map)# exit

 

 

Router(config)#

 

Step 5

 

 

crypto map map-nameseq-num[ipsec-isakmp]

Creates a crypto map profile.

 

[dynamic dynamic-map-name] [discover]

 

 

[profile profile-name]

 

 

Example:

 

 

Router(config)# crypto map static-map 1

 

 

ipsec-isakmp dynamic dynmap

 

 

Router(config)#

 

 

 

 

Apply the Crypto Map to the Physical Interface

The crypto maps must be applied to each interface through which IPsec traffic flows. Applying the crypto map to the physical interface instructs the router to evaluate all the traffic against the security associations database. With the default configurations, the router provides secure connectivity by encrypting the traffic sent between remote sites. However, the public interface still allows the rest of the traffic to pass and provides connectivity to the Internet.

Perform these steps to apply a crypto map to an interface, beginning in global configuration mode:

 

Command or Action

Purpose

Step 1

 

 

interface type number

Enters interface configuration mode for the

 

 

interface to which you want to apply the crypto

 

Example:

map.

 

Router(config)# interface fastethernet 4

 

 

Router(config-if)#

 

 

 

 

Cisco Secure Router 520 Series Software Configuration Guide

 

OL-14210-01

7-7

 

 

 

Page 83
Image 83
Cisco Systems 520 series manual Apply the Crypto Map to the Physical Interface