Chapter 13 Configuring a VPN Using Easy VPN and an IPSec Tunnel

Configuration Tasks

SUMMARY STEPS

1.crypto dynamic-mapdynamic-map-name dynamic-seq-num

2.set transform-settransform-set-name [transform-set-name2...transform-set-name6]

3.reverse-route

4.exit

5.crypto map map-nameseq-num[ipsec-isakmp] [dynamic dynamic-map-name] [discover] [profile profile-name]

DETAILED STEPS

 

Command or Action

Purpose

Step 1

 

 

crypto dynamic-map dynamic-map-name

Creates a dynamic crypto map entry and enters

 

dynamic-seq-num

crypto map configuration mode.

 

Example:

See Cisco IOS Security Command Reference for

 

more details about this command.

 

Router(config)# crypto dynamic-map dynmap 1

 

 

 

Router(config-crypto-map)#

 

Step 2

 

 

set transform-set transform-set-name

Specifies which transform sets can be used with

 

[transform-set-name2...transform-set-name6]

the crypto map entry.

 

Example:

 

 

Router(config-crypto-map)# set

 

 

transform-set vpn1

 

 

Router(config-crypto-map)#

 

Step 3

 

 

reverse-route

Creates source proxy information for the crypto

 

Example:

map entry.

 

See Cisco IOS Security Command Reference for

 

Router(config-crypto-map)# reverse-route

 

details.

 

Router(config-crypto-map)#

 

 

Step 4

 

 

exit

Returns to global configuration mode.

 

Example:

 

 

Router(config-crypto-map)# exit

 

 

Router(config)#

 

Step 5

 

 

crypto map map-nameseq-num[ipsec-isakmp]

Creates a crypto map profile.

 

[dynamic dynamic-map-name] [discover]

 

 

[profile profile-name]

 

 

Example:

 

 

Router(config)# crypto map static-map 1

 

 

ipsec-isakmp dynamic dynmap

 

 

Router(config)#

 

 

 

 

 

 

Cisco 819 Integrated Services Routers Software Configuration Guide

 

 

 

 

 

 

OL-23590-02

 

 

13-9

 

 

 

 

 

Page 157
Image 157
Cisco Systems C819HG4GVK9, C819GUK9 manual 13-9