Creating A Crypto Map Entry To Use The Dynamic Crypto Map - Cisco FirePOWER ASA 5500 series Configuration Manual

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Chapter 32
Configuring Remote Access IPSec VPNs

Creating a Crypto Map Entry to Use the Dynamic Crypto Map

Next create a crypto map entry that lets the security appliance use the dynamic crypto map to set the
parameters of IPSec security associations.
In the following examples for this command, the name of the crypto map is mymap, the sequence number
is 1, and the name of the dynamic crypto map is dyn1, which you created in the previous section,
"Creating a Dynamic Crypto
To create a crypto map entry that uses a dynamic crypto map, enter the crypto map command. The
Step 1
syntax is crypto map map-name seq-num ipsec-isakmp dynamic dynamic-map-name.
hostname(config)#
hostname(config)#
To apply the crypto map to the outside interface, enter the crypto map interface command.
Step 2
The syntax is crypto map map-name interface interface-name
hostname(config)# crypto map mymap interface outside
hostname(config)#
OL-10088-01
Map." Enter these commands in global configuration mode.
crypto map mymap 1 ipsec-isakmp dynamic dyn1
Cisco Security Appliance Command Line Configuration Guide
Creating a Crypto Map Entry to Use the Dynamic Crypto Map
32-7

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents