Cisco Systems OL-6426-02 manual Apply Mode Configuration to the Crypto Map

Models: OL-6426-02

1 196
Download 196 pages 47.1 Kb
Page 77
Image 77

Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel

Apply Mode Configuration to the Crypto Map

BETA DRAFT - CISCO CONFIDENTIAL

 

Command or Action

Purpose

Step 5

 

 

 

exit

 

Exits IKE group policy configuration mode, and

 

 

 

enters global configuration mode.

 

Example:

 

 

 

Router(config-isakmp-group)# exit

 

 

Router(config)#

 

Step 6

 

 

ip local pool {default poolname}

Specifies a local address pool for the group.

 

[low-ip-address [high-ip-address]]

For details about this command and additional

 

 

 

 

Example:

 

parameters that can be set, see the Cisco IOS Dial

 

 

Technologies Command Reference.

 

 

 

 

Router(config)# ip local pool dynpool

 

 

30.30.30.20

30.30.30.30

 

 

Router(config)#

 

 

 

 

 

Apply Mode Configuration to the Crypto Map

Perform these steps to apply mode configuration to the crypto map, beginning in global configuration mode:

 

Command or Action

Purpose

Step 1

 

 

crypto map map-nameisakmp authorization list

Applies mode configuration to the crypto map and

 

list-name

enables key lookup (IKE queries) for the group

 

 

policy from an authentication, authorization, and

 

Example:

accounting (AAA) server.

 

Router(config)# crypto map dynmap isakmp

 

 

authorization list rtr-remote

 

 

Router(config)#

 

Step 2

 

 

crypto map tag client configuration address

Configures the router to reply to mode

 

[initiate respond]

configuration requests from remote clients.

 

Example:

 

 

Router(config)# crypto map dynmap client

 

 

configuration address respond

 

 

Router(config)#

 

 

 

 

Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide

 

OL-6426-02

6-5

 

 

 

Page 77
Image 77
Cisco Systems OL-6426-02 manual Apply Mode Configuration to the Crypto Map, Ip local pool default poolname