Chapter 13 Configuring a VPN Using Easy VPN and an IPSec Tunnel

Configuration Tasks

 

Command or Action

Purpose

Step 5

 

 

 

exit

 

Exits IKE group policy configuration mode and

 

Example:

 

enters global configuration mode.

 

 

 

 

Router(config-isakmp-group)# exit

 

 

Router(config)#

 

Step 6

 

 

ip local pool {default poolname}

Specifies a local address pool for the group.

 

[low-ip-address [high-ip-address]]

For details about this command and additional

 

 

 

 

Example:

 

parameters that can be set, see Cisco IOS Dial

 

 

Technologies Command Reference.

 

Router(config)# ip local pool dynpool

 

 

 

30.30.30.20

30.30.30.30

 

 

Router(config)#

 

 

 

 

 

Apply Mode Configuration to the Crypto Map

Perform these steps to apply mode configuration to the crypto map, beginning in global configuration mode:

SUMMARY STEPS

1.crypto map map-nameisakmp authorization list list-name

2.crypto map tag client configuration address [initiate respond]

DETAILED STEPS

 

Command or Action

Purpose

Step 1

 

 

crypto map map-nameisakmp authorization

Applies mode configuration to the crypto map and

 

list list-name

enables key lookup (IKE queries) for the group

 

Example:

policy from an authentication, authorization, and

 

accounting (AAA) server.

 

 

 

Router(config)# crypto map dynmap isakmp

 

 

authorization list rtr-remote

 

 

Router(config)#

 

Step 2

 

 

crypto map tag client configuration address

Configures the router to reply to mode

 

[initiate respond]

configuration requests from remote clients.

 

Example:

 

 

Router(config)# crypto map dynmap client

 

 

configuration address respond

 

 

Router(config)#

 

 

 

 

 

Cisco 819 Integrated Services Routers Software Configuration Guide

13-6

OL-23590-02

Page 154
Image 154
Cisco Systems C819GUK9, C819HG4GVK9 manual Apply Mode Configuration to the Crypto Map, 13-6