Protect Crypto Map - Avaya G250 Reference

Cli reference
Hide thumbs Also See for G250:
Table of Contents

Advertisement

CLI Commands

protect crypto map

Use the protect crypto map command to protect traffic that matches this rule, by applying
the IPSec processing configured by the specific crypto map.
Use the no protect command to specify that traffic matching this IP rule should not be
protected. Traffic that matches this rule bypasses IPSec processing, and continues
unprotected.
Note:
You cannot enable or disable crypto map protection when the crypto-list is active.
Note:
You must first deactivate the list using the no ip crypto-group command in
the context of the interface on which the crypto-list is activated.
Syntax
protect crypto map crypto-map-id
no protect
Parameters
Parameter
crypto-map-id
User level
read-write
Context
crypto map/ip-rule
Examples
G350-001(crypto 901/ip rule 21)# protect crypto map 5
G350-001(crypto 901/ip rule 22)# no protect
Related commands
description (ip
crypto-list
360 Avaya G250 and Avaya G350 CLI Reference
Description
The ID of the crypto map
rule), destination-ip,
ip
crypto-list,
ip-rule
(VPN), local-address, source-ip,
Possible
Default
Values
Value
1-50
show ip

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents