Chapter 9 Configuring Security Features

Configuring VPN

 

Command or Action

Purpose

Step 5

 

 

 

exit

 

Exits IKE group policy configuration mode and

 

Example:

 

enters global configuration mode.

 

 

 

 

Router(config-isakmp-group)# exit

 

 

Router(config)#

 

Step 6

 

 

ip local pool {default pool name}

Specifies a local address pool for the group.

 

[low-ip-address {high-ip-address]]

For details about this command and additional

 

 

 

 

Example:

 

parameters that can be set, see Cisco IOS Dial

 

 

Technologies Command Reference.

 

Router(config)# ip local pool dynpool

 

 

 

30.30.30.20

30.30.30.30

 

 

Router(config)#

 

 

 

 

 

Apply Mode Configuration to the Crypto Map

To apply mode configuration to the crypto map, perform these steps, beginning in global configuration mode:

SUMMARY STEPS

1.crypto map map-nameisakmp authorization list list-name

2.crypto map tag client configuration address [initiate respond]

DETAILED STEPS

 

Command or Action

Purpose

Step 1

 

 

crypto map map-nameisakmp authorization

Applies mode configuration to the crypto map and

 

list list-name

enables key lookup (IKE queries) for the group

 

Example:

policy from an authentication, authorization, and

 

accounting (AAA) server.

 

 

 

Router(config)# crypto map dynmap isakmp

 

 

authorization list rtr-remote

 

 

Router(config)#

 

Step 2

 

 

crypto map tag client configuration address

Configures the router to reply to mode

 

[initiate respond]

configuration requests from remote clients.

 

Example:

 

 

Router(config)# crypto map dynmap client

 

 

configuration address respond

 

 

Router(config)#

 

 

 

 

 

Cisco 819 Series Integrated Services Routers Software Configuration Guide

9-10

OL-23590-02

Page 104
Image 104
Cisco Systems C819GUK9, C819HG4GVK9 Apply Mode Configuration to the Crypto Map, Exits IKE group policy configuration mode