D-Link DI-1750 Reference Manual page 364

Hide thumbs Also See for DI-1750:
Table of Contents

Advertisement

Will you excute it? (Y/N):y
Key Word:
Q(quit)
......
(11)permit
(13)router
......
Please Input the code of command to be excute(0-14): 11
Key Word:
U(undo)
D(default)
......
(03)ip
(04)ospf
(05)tcp
(06)udp
Please Input the code of command to be excute(0-6): 3
Key Word:
Q(quit)
(00)A.B.C.D
(01)any
Please Input the code of command to be excute(0-1): 0
Please input a IP Address:192.168.1.0 255.255.255.0 (Input source ip address)
Key Word:
Q(quit)
(00)A.B.C.D
(01)any
Please Input the code of command to be excute(0-1): 0
Please input a IP Address:192.168.2.0 255.255.255.0 (Input dest ip address)
Key Word:
Q(quit)
......
(03)precedence
(04)<cr>
Please Input the code of command to be excute(0-4): 4
Will you excute it? (Y/N):y
1. Crypto Access List Tips
Using the permit keyword causes all IP traffic that matches the specified conditions to be protected by
crypto, using the policy described by the corresponding crypto map entry. Using the deny keyword
prevents traffic from being protected by crypto in the context of that particular crypto map entry. (In
other words, it does not allow the policy as specified in this crypto map entry to be applied to this traffic.)
If this traffic is denied in all of the crypto map entries for that interface, then the traffic is not protected by
crypto.
The crypto access list you define will be applied to an interface after you define the corresponding
crypto map entry and apply the crypto map set to the interface. Different access lists must be used in
different entries of the same crypto map set. (These two tasks are described in following sections.)
However, both inbound and outbound traffic will be evaluated against the same "outbound" IPSec
access list. Therefore, the access list's criteria is applied in the forward direction to traffic exiting your
router, and the reverse direction to traffic entering your router.
If you configure multiple statements for a given crypto access list which is used for IPSec, only the first
permit statement is useful.
2. Using the any Keyword in Crypto Access Lists
When you create crypto access lists, using the any keyword could cause problems. D-Link discourages
the use of the any keyword to specify source or destination addresses.
Model Name
Specify packets to forward
routing protocol configuration
Q(quit)
Internet Protocol
OSPF routing protocol
Transmission Control Protocol
User Datagram Protocol
Address to match
Any source host
Address to match
Any destination host
Match packets with given precedence value
- 362 -

Advertisement

Table of Contents
loading

This manual is also suitable for:

Di-2621Di-2630Di-3660

Table of Contents