Motorola RFS6000 Reference Manual page 464

Hide thumbs Also See for RFS6000:
Table of Contents

Advertisement

10-8
Motorola RF Switch CLI Reference Guide
Usage Guidelines
Crypto map entries do not directly contain the selectors used to determine which data to
secure. Instead, the crypto map entry refers to an access control list. An access control list
(ACL) is assigned to the crypto map using the match address command. If no ACL is
configured for a crypto map, the entry is incomplete and will have no effect on the system.
The entries of the ACL used in a crypto map should be created with respect to traffic sent
by the OS. The source information must be the local OS, and the destination must be the
peer.
Only extended access-lists can be used in crypto maps.
Example
The following entails setting up an ACL (called TestList) and assigning the new list to a
crypto map (called TestMap):
RFSwitch(config)#ip access-list extended TestList
Configuring New Extended ACL "TestList"
(config-ext-nacl)#exit
RFSwitch(config)#crypto map TestMap 220 isakmp dynamic
RFSwitch(config-crypto-map)#
RFSwitch(config-crypto-map)#match address TestMap
RFSwitch(config-crypto-map)#

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs7000

Table of Contents