8-63
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
Chapter8 Site-to-Site VPN
Edit Site-to-Site VPN
What Do You Want to Do?
Crypto Map Wizard: Traffic to Protect
This window lets you define which traffic is encrypted. You can specify that all
traffic to the remote device be encrypted; you can specify that traffic between
specified subnets be encrypted; you can specify an IPSec rule that can define
multiple source and destination subnets and the types of traffic to be encrypted.

Protect all traffic between the following subnets

Use this option to specify a single source subnet (a sub net on the LAN) whose
traffic you want to encrypt, and one destination subnet supported by the peer that
you specified in the Peers window. All traffic flowing between other source and
destination subnets will be sent unencrypted.
Source
Enter the address of the subnet whose outgoing traffic you want to prote ct, and
specify the subnet mask. You can either select a subnet mask from the list or type
in a custom mask. The subnet number and mask must be entered in dotted decima l
format. For more information, see IP Addresses and Subnet Masks.
If you want to: Do this:
Use the selected transform set for the
crypto map.
Click Next.
Use another existing transform set. Select it in the Select Transform Set list, and click Next.
Use a new transform set. Click Add, and create the transform set in the Add Transform
Set window. Then, return to this window, and click Next.
Edit the selected transform set. Click Edit, and edit the transform set in the Edit Transform
Set window.
Add more transform sets to this crypto
map. You may wish to do this to ensure
that the router can offer a transform set
that the peer will agree to use.
Leave the crypto map wizard, uncheck Use Add Wizard, and
click Add Crypto Map. The Transform Set tab allows you to
add and order transform sets.