Cisco Systems C7200 manual Creating Dynamic Crypto Maps 4, Verifying the Configuration 4

Models: C7200

1 62
Download 62 pages 7.3 Kb
Page 5
Image 5
Creating Dynamic Crypto Maps 4 - 12

Contents

Changing Existing Transforms

4 - 8

 

 

Transform Example

4 - 8

 

 

 

 

Configuring IPSec

4 - 8

 

 

 

 

 

Ensuring That Access Lists Are Compatible with IPSec

4 - 8

Setting Global Lifetimes for IPSec Security Associations

4 - 8

Creating Crypto Access Lists

4 - 10

 

 

 

Creating Crypto Map Entries

4 - 10

 

 

 

Creating Dynamic Crypto Maps 4 - 12

 

 

Applying Crypto Map Sets to Interfaces

4 - 14

 

Monitoring and Maintaining IPSec

4 - 14

 

 

Verifying IKE and IPSec Configurations

4 - 15

 

 

Verifying the Configuration 4 - 16

 

 

 

Configuration Examples

4 - 18

 

 

 

 

Configuring IKE Policies Example

4 - 18

 

 

 

Configuring IPSec Configuration Example

4 - 18

 

Basic IPSec Configuration Illustration

4 - 19

 

 

 

Router A Configuration

4 - 19

 

 

 

 

Router B Configuration

4 - 20

 

 

 

 

Troubleshooting Tips

4 - 21

 

 

 

 

 

Monitoring and Maintaining the VSA

4 - 23

 

 

 

Using Deny Policies in Access Lists

4 - 23

 

 

Configuration Guidelines and Restrictions

4 - 24

 

Monitor and Maintenance Commands

4 - 24

 

 

I N D E X

C7200 VSA (VPN Services Adapter) Installation and Configuration Guide

 

OL-9129-02

v

 

Page 5
Image 5
Cisco Systems C7200 manual Creating Dynamic Crypto Maps 4, Verifying the Configuration 4, Router A Configuration