Cisco Systems C819GUK9 Configure IPSec Transforms and Protocols, the tunnel for encryption, 9-12

Models: C819GUK9

1 196
Download 196 pages 51.42 Kb
Page 106
Image 106
Configure IPSec Transforms and Protocols

Chapter 9 Configuring Security Features

Configuring VPN

Configure IPSec Transforms and Protocols

A transform set represents a certain combination of security protocols and algorithms. During IKE negotiation, the peers agree to use a particular transform set for protecting data flow.

During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at both peers. When a transform set that contains such a transform is found, it is selected and applied to the protected traffic as a part of both peers’ configurations.

To specify the IPSec transform set and protocols, perform these steps, beginning in global configuration mode:

SUMMARY STEPS

1.crypto ipsec profile profile-name

2.crypto ipsec transform-settransform-set-name transform1 [transform2] [transform3] [transform4]

3.crypto ipsec security-association lifetime {seconds seconds kilobytes kilobytes}

DETAILED STEPS

 

Command or Action

Purpose

Step 1

 

 

crypto ipsec profile profile-name

Configures IPSec profile to apply protection on

 

Example:

the tunnel for encryption.

 

 

 

Router(config)# crypto ipsec profile pro1

 

 

Router(config)#

 

Step 2

 

 

crypto ipsec transform-set

Defines a transform set—an acceptable

 

transform-set-name transform1 [transform2]

combination of IPSec security protocols and

 

[transform3] [transform4]

algorithms.

 

 

 

Example:

See Secure Connectivity Configuration Guide

 

Router(config)# crypto ipsec transform-set

Library, Cisco IOS Release 12.4T for details about

 

the valid transforms and combinations.

 

vpn1 esp-3des esp-sha-hmac

 

Router(config)#

 

Step 3

 

 

crypto ipsec security-association lifetime

Specifies global lifetime values used when IPSec

 

{seconds seconds kilobytes kilobytes}

security associations are negotiated.

 

Example:

 

 

Router(config)# crypto ipsec

 

 

security-association lifetime seconds 86400

 

 

Router(config)#

 

 

 

 

Configure the IPSec Crypto Method and Parameters

A dynamic crypto map policy processes negotiation requests for new security associations from remote IPSec peers, even if the router does not know all the crypto map parameters (for example, IP address).

To configure the IPSec crypto method, perform these steps, beginning in global configuration mode:

 

Cisco 819 Series Integrated Services Routers Software Configuration Guide

9-12

OL-23590-02

Page 106
Image 106
Cisco Systems C819GUK9 Configure IPSec Transforms and Protocols, Configure the IPSec Crypto Method and Parameters, 9-12