CLI Commands
Related Commands - VPN
description (ip
show ip crypto-list
protect crypto map
Use the protect crypto map command to protect traffic that matches this rule, by applying
the IPSec processing configured by the specific crypto map.
Use the no protect command to specify that traffic matching this IP rule should not be
protected. Traffic that matches this rule bypasses IPSec processing, and continues
unprotected.
Note:
You cannot enable or disable crypto map protection when the crypto-list is active.
Note:
You must first deactivate the list using the no ip crypto-group command in
the context of the interface on which the crypto-list is activated.
Syntax
protect crypto map crypto-map-id
no protect
Parameters
Parameter
crypto-map-id
User Level
read-write
Context
ip crypto-list/ip-rule
Examples
To protect traffic by applying the IPSec processing configured by crypto map 5:
G450-001(crypto 901/ip rule 21)# protect crypto map 5
1246 Avaya G450 CLI Reference
rule),
ip
crypto-list,
ip-rule
Description
The ID of the crypto map
(VPN), local-address,
protect crypto
map, source-ip,
Possible
Default
Values
Value
1-50
VPN