Security Features
Step 3: Display the crypto interfaces:
Router1# show crypto interfaces
Interface | Network |
Name | Type |
ethernet0 | trusted |
wan1 | untrusted |
Step 4: Configure dynamic IKE policy for a group of mobile users:
Router1/configure# crypto Router1/configure/crypto# dynamic Router1/configure/crypto/dynamic# ike policy sales
Router1/configure/crypto/dynamic/ike/policy sales#
Default proposal created with
Default ipsec proposal 'sales' added with
Router1/configure/crypto/dynamic/ike/policy sales#
Router1/configure/crypto/dynamic/ike/policy sales# key secretkeyforsales Router1/configure/crypto/dynamic/ike/policy sales# proposal 1 Router1/configure/crypto/dynamic/ike/policy sales/proposal 1#
Step 5: Display dynamic IKE policies:
Router1# show crypto dynamic ike policy all |
| |||
Policy | Mode | Transform | ||
sales | U david@foun... Aggressive P1 | |||
|
|
|
|
|
June 2004 | © 2004 Foundry Networks, Inc. | 15 - 39 |