Apply Mode Configuration To The Crypto Map - Cisco 520-T1 - Small Business Pro SR Secure Router Software Configuration Manual

Software guide
Table of Contents

Advertisement

Chapter 6
Configuring a VPN Using Easy VPN and an IPsec Tunnel
Command or Action
Step 4
domain name
Example:
Router(config-isakmp-group)# domain
company.com
Router(config-isakmp-group)#
Step 5
exit
Example:
Router(config-isakmp-group)# exit
Router(config)#
Step 6
ip local pool {default | poolname}
[low-ip-address [high-ip-address]]
Example:
Router(config)# ip local pool dynpool
30.30.30.20 30.30.30.30
Router(config)#

Apply Mode Configuration to the Crypto Map

Perform these steps to apply mode configuration to the crypto map, beginning in global configuration
mode:
Command or Action
Step 1
crypto map map-name isakmp authorization list
list-name
Example:
Router(config)# crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Step 2
crypto map tag client configuration address
[initiate | respond]
Example:
Router(config)# crypto map dynmap client
configuration address respond
Router(config)#
OL-14210-01
Apply Mode Configuration to the Crypto Map
Purpose
Specifies group domain membership.
Exits IKE group policy configuration mode, and
enters global configuration mode.
Specifies a local address pool for the group.
For details about this command and additional
parameters that can be set, see the
Technologies Command
Purpose
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an authentication, authorization, and
accounting (AAA) server.
Configures the router to reply to mode
configuration requests from remote clients.
Cisco Secure Router 520 Series Software Configuration Guide
Cisco IOS Dial
Reference.
6-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents