Motorola RFS7000 Reference Manual page 359

Rfs series wireless lan switches
Hide thumbs Also See for RFS7000:
Table of Contents

Advertisement

Crypto-map Instance
10-7
Usage Guidelines
Crypto map entries do not directly contain the selectors used to determine which data to
secure. Instead, the crypto map entry refers to an access control list. An access control list
(ACL) is assigned to the crypto map using the match address command. If no ACL is
configured for a crypto map, the entry is incomplete and will have no effect on the system.
The entries of the ACL used in a crypto map should be created with respect to traffic sent
by the OS. The source information must be the local OS, and the destination must be the
peer.
Only extended access-lists can be used in crypto maps.
Example
The following entails setting up an ACL (called TestList) and assigning the new list to a
crypto map (called TestMap):
RFSwitch(config)#ip access-list extended TestList
Configuring New Extended ACL "TestList"
(config-ext-nacl)#exit
RFSwitch(config)#crypto map TestMap 220 isakmp dynamic
RFSwitch(config-crypto-map)#
RFSwitch(config-crypto-map)#match address TestMap
RFSwitch(config-crypto-map)#

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs6000Ws5100

Table of Contents