Chapter8 Site-to-Site VPN
Edit Site-to-Site VPN
8-64
Cisco Router and Security Device Manager Version 2.2 Users Guide
OL-4015-08
All traffic from this source subnet that has a destination IP address on the
destination subnet will be encrypted.
Destination
Enter the address of the destination subnet, and specify t he mask for that subnet.
You can either select a subnet mask from the list or type in a custom mask. The
subnet number and mask must be entered in dotted decimal format.
All traffic going to the hosts in this subnet will be encrypted.

Create/Select an access-list for IPSec traffic

Use this option if you need to specify multiple sources and destinations, and/or
specific types of traffic to encrypt. An IPSec rule can consist of multiple entries,
each specifying different traffic types and different sources and destinations.
Click the button next to the field and specify an existing IPSec rule that defines
the traffic you want to protect, or create an IPSec rule to use for this crypto map.
If you know the number of the IPSec rule, enter it in the box to the right. If you
do not know the number of the rule, click the ... button and browse for the rule.
When you select it, the number will appear in the box.
Note Because they can specify traffic type, and both source and destination, IPSec rules
are extended rules. If you enter the number or name of a standard rule, a Warning
message is displayed indicating that you have entered the name or number of a
standard rule.
Any packets that do not match the criteria in the IPSec rule are sent unencrypted.
Crypto Map Wizard: Summary of the configuration
The Cryptomap wizard summary page displays the data you entered in the wizard
windows. You can review it, click Back to return to a screen to make changes, and
then return to the Summary window and click Finish to deliver the cryptomap
configuration to the router.