Chapter 4 Configuring the VSA

Basic IPSec Configuration Illustration

Note In the preceding example, the encryption DES of policy 15 would not appear in the written configuration because this is the default value for the encryption algorithm parameter.

A transform set defines how the traffic will be protected:

crypto ipsec transform-set auth1 ah-md5-hmac esp-des esp-md5-hmac mode tunnel

Note In the preceding example, the mode tunnel would not appear in the written configuration because this is the default value for the transform-set.

A crypto map joins the transform set and specifies where the protected traffic is sent (the remote IPSec peer):

crypto map toRemoteSite 10 ipsec-isakmp match address 101

set peer 10.2.2.3

set transform-set auth1

The crypto map is applied to an interface:

interface Serial0

ip address 10.0.0.3

crypto map toRemoteSite

An IPSec access list defines which traffic to protect:

access-list 101 permit ip host 10.0.0.2 host 10.2.2.2

access-list 101 permit ip host 10.0.0.3 host 10.2.2.3

Router B Configuration

Specify the parameters to be used during an IKE negotiation:

crypto isakmp policy 15 encryption des

hash md5

authentication pre-share group 2

lifetime 5000

crypto isakmp key 1234567890 address 10.0.0.3 crypto isakmp identity address

A transform set defines how the traffic will be protected:

crypto ipsec transform-set auth1 ah-md5-hmac esp-des ah-md5-hmac mode tunnel

Note In the preceding example, the parameter “mode tunnel” would not appear in the written configuration because this is the default value for this configuration.

C7200 VSA (VPN Services Adapter) Installation and Configuration Guide

4-20

OL-9129-02

 

 

Page 54
Image 54
Cisco Systems C7200 manual Router B Configuration, Transform set defines how the traffic will be protected