Generate Mirror - Cisco OL-4015-08 User Manual

Cisco router and security device manager user's guide
Table of Contents

Advertisement

Edit Site-to-Site VPN
Destination
To ping a remote peer:
To clear the output of the ping command:

Generate Mirror...

Peer Device
To create a text file of the IPSec policy:
Caution
Cisco Router and Security Device Manager Version 2.2 User's Guide
8-66
Select the IP address that you want to ping. If the address you want to use is not
in the list, you can enter a different one in the field.
Specify the source and destination, and click Ping. You can read the output of the
ping command to determine whether the ping was successful.
Click Clear.
This window shows you the IPSec policy used for the VPN tunnel to the selected
peer, and allows you to save the policy in a text file that you can use when
configuring the VPN connection on the peer device.
Select the IP address or host name of the peer device to see the IPSec policy
configured for the tunnel to that device. The policy appears in the box under the
peer IP address.
Click Save, and specify a name and location for the text file. You can give this text
file to the administrator of the peer device so that he or she can create a policy that
mirrors the one you created on the router. Click
Do I Configure the VPN on the Peer Router?
create a mirror policy.
The text file that you generate must not be copied into the configuration file of the
remote system, but must be used only to show what has been configured on the
local router so that the remote device can be configured in a way that is
compatible. Identical names for IPSec policies, IKE policies, and transform sets
Chapter 8
Site-to-Site VPN
After Configuring a VPN, How
to learn how to use the text file to
OL-4015-08

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents