Chapter 7 Configuring VPNs Using an IPsec Tunnel and Generic Routing Encapsulation

Configuration Example

 

Command or Action

Purpose

Step 5

 

 

crypto map map-name

Assigns a crypto map to the tunnel.

 

Example:

Note Dynamic routing or static routes to the

 

tunnel interface must be configured to

 

 

 

Router(config-if)#crypto map static-map

establish connectivity between the sites.

 

Router(config-if)#

See the Cisco IOS Security Configuration

 

 

 

 

Guide for details.

Step 6

 

 

exit

Exits interface configuration mode, and returns to

 

 

global configuration mode.

 

Example:

 

 

Router(config-if)# exit

 

 

Router(config)#

 

Step 7

 

 

ip access-list {standard extended}

Enters ACL configuration mode for the named

 

access-list-name

ACL that is used by the crypto map.

 

Example:

 

 

Router(config)# ip access-list extended

 

 

vpnstatic1

 

 

Router(config-ext-nacl)#

 

Step 8

 

 

permit protocol source source-wildcard

Specifies that only GRE traffic is permitted on the

 

destination destination-wildcard

outbound interface.

 

Example:

 

 

Router(config-ext-nacl)# permit gre host

 

 

192.168.100.1 host 192.168.101.1

 

 

Router(config-ext-nacl)#

 

Step 9

 

 

exit

Returns to global configuration mode.

 

Example:

 

 

Router(config-ext-nacl)# exit

 

 

Router(config)#

 

 

 

 

Configuration Example

The following configuration example shows a portion of the configuration file for a VPN using a GRE tunnel scenario described in the preceding sections.

!

aaanew-model

!

aaa authentication login rtr-remote local aaa authorization network rtr-remote local aaa session-id common

!

username cisco password 0 cisco

!

interface tunnel 1

ip address 10.62.1.193 255.255.255.252

Cisco Secure Router 520 Series Software Configuration Guide

 

OL-14210-01

7-9

 

 

 

Page 85
Image 85
Cisco Systems 520 series Assigns a crypto map to the tunnel, Tunnel interface must be configured to, Guide for details