Cisco Systems C819GUK9 Apply the Crypto Map to the Physical Interface, Where to Go Next, applied

Models: C819GUK9

1 196
Download 196 pages 51.42 Kb
Page 108
Image 108
Apply the Crypto Map to the Physical Interface

Chapter 9 Configuring Security Features

Configuring VPN

Apply the Crypto Map to the Physical Interface

The crypto maps must be applied to each interface through which IPSec traffic flows. Applying the crypto map to the physical interface instructs the router to evaluate all the traffic against the security associations database. With the default configurations, the router provides secure connectivity by encrypting the traffic sent between remote sites. However, the public interface still allows the rest of the traffic to pass and provides connectivity to the Internet.

To apply a crypto map to an interface, perform these steps, beginning in global configuration mode:

SUMMARY STEPS

1.interface type number

2.crypto map map-name

3.exit

DETAILED STEPS

 

Command or Action

Purpose

Step 1

 

 

interface type number

Enters the interface configuration mode for the

 

Example:

interface to which you want the crypto map

 

applied.

 

Router(config)# interface fastethernet 4

 

 

Router(config-if)#

 

Step 2

 

 

crypto map map-name

Applies the crypto map to the interface.

 

Example:

See Cisco IOS Security Command Reference for

 

more details about this command.

 

Router(config-if)# crypto map static-map

 

 

 

Router(config-if)#

 

Step 3

 

 

exit

Returns to global configuration mode.

 

Example:

 

 

Router(config-crypto-map)# exit

 

 

Router(config)#

 

 

 

 

Where to Go Next

If you are creating a Cisco Easy VPN remote configuration, go to the “Create a Cisco Easy VPN Remote Configuration” section on page 9-15.

If you are creating a site-to-site VPN using IPSec tunnels and GRE, go to the “Configure a Site-to-Site GRE Tunnel” section on page 9-17.

 

Cisco 819 Series Integrated Services Routers Software Configuration Guide

9-14

OL-23590-02

Page 108
Image 108
Cisco Systems C819GUK9 Apply the Crypto Map to the Physical Interface, Where to Go Next, crypto map map-name 3. exit, 9-14