security parameters in the Crypto Maps at both peers. Allows you to specify a lifetime for the IPSec security association. Allows encryption keys to change during IPSec sessions. Permits Certification Authority (CA) support for a manageable, scalable IPSec implementation. Allows dynamic authentication of peers. If you do not want IKE to be used with your IPSec implementation, you can disable it for IPSec peers. You cannot have a mix of
•Configure security associations parameters
The use of manual security associations is a result of a prior arrangement between switch users and the IPSec peer. If IKE is not used for establishing security associations, there is no negotiation of security associations, so the configuration information in both systems must be the same for traffic to be processed successfully by IPSec.
•Define transform sets
A transform set represents a combination of security protocols and algorithms. During the IPSec security association negotiation, peers agree to use a particular transform set for protecting data flow.
With manually established security associations, there is no negotiation with the peer, so both sides must specify the same transform set. If you change a transform set definition, the change is only applied to Crypto Map entries that reference the transform set. The change is not applied to existing security associations, but is used in subsequent negotiations to establish new security associations.
•Create Crypto Map entries
When IKE is used to establish security associations, the IPSec peers can negotiate the settings they use for the new security associations. Therefore, you can specify lists (such as lists of acceptable transforms) within the Crypto Map entry.
•Apply Crypto Map sets to Interfaces
You must assign a Crypto Map set to each interface through which IPSec traffic flows. The security appliance supports IPSec on all interfaces. Assigning the Crypto Map set to an interface instructs the security appliance to evaluate all the traffic against the Crypto Map set and to use the specified policy during connection or SA negotiation. Assigning a Crypto Map to an interface also initializes
•Monitor and maintain IPSec tunnels
New configuration changes will only take effect when negotiating subsequent security associations. If you want the new settings to take immediate effect, you must clear the existing security associations so that they will be
For manually established security associations, clear and reinitialize the security associations or the changes will not take effect.
For more information on configuring IPSec VPN, refer to the following: