Protect Crypto Map - Avaya G450 Cli Reference Manual

Hide thumbs Also See for G450:
Table of Contents

Advertisement

CLI Commands
Related Commands - VPN
description (ip
show ip crypto-list

protect crypto map

Use the protect crypto map command to protect traffic that matches this rule, by applying
the IPSec processing configured by the specific crypto map.
Use the no protect command to specify that traffic matching this IP rule should not be
protected. Traffic that matches this rule bypasses IPSec processing, and continues
unprotected.
Note:
You cannot enable or disable crypto map protection when the crypto-list is active.
Note:
You must first deactivate the list using the no ip crypto-group command in
the context of the interface on which the crypto-list is activated.
Syntax
protect crypto map crypto-map-id
no protect
Parameters
Parameter
crypto-map-id
User Level
read-write
Context
ip crypto-list/ip-rule
Examples
To protect traffic by applying the IPSec processing configured by crypto map 5:
G450-001(crypto 901/ip rule 21)# protect crypto map 5
1246 Avaya G450 CLI Reference
rule),
ip
crypto-list,
ip-rule
Description
The ID of the crypto map
(VPN), local-address,
protect crypto
map, source-ip,
Possible
Default
Values
Value
1-50
VPN

Advertisement

Table of Contents
loading

Table of Contents

Save PDF