Configure The Ipsec Crypto Method And Parameters - Cisco 520-T1 - Small Business Pro SR Secure Router Software Configuration Manual

Software guide
Table of Contents

Advertisement

Chapter 6
Configuring a VPN Using Easy VPN and an IPsec Tunnel
Perform these steps to specify the IPsec transform set and protocols, beginning in global configuration
mode:
Command or Action
Step 1
crypto ipsec transform-set transform-set-name
transform1 [transform2] [transform3]
[transform4]
Example:
Router(config)# crypto ipsec transform-set
vpn1 esp-3des esp-sha-hmac
Router(cfg-crypto-trans)#
Step 2
crypto ipsec security-association lifetime
{seconds seconds | kilobytes kilobytes}
Example:
Router(cfg-crypto-trans)# crypto ipsec
security-association lifetime seconds 86400
Router(config)#
With manually established security associations, there is no negotiation with the peer, and both sides
Note
must specify the same transform set.

Configure the IPsec Crypto Method and Parameters

A dynamic crypto map policy processes negotiation requests for new security associations from remote
IPsec peers, even if the router does not know all the crypto map parameters (for example, IP address).
Perform these steps to configure the IPsec crypto method, beginning in global configuration mode:
Command or Action
Step 1
crypto dynamic-map dynamic-map-name
dynamic-seq-num
Example:
Router(config)# crypto dynamic-map dynmap 1
Router(config-crypto-map)#
Step 2
set transform-set transform-set-name
[transform-set-name2...transform-set-name6]
Example:
Router(config-crypto-map)# set
transform-set vpn1
Router(config-crypto-map)#
OL-14210-01
Configure the IPsec Crypto Method and Parameters
Purpose
Defines a transform set—an acceptable
combination of IPsec security protocols and
algorithms.
See the
Cisco IOS Security Command Reference
for detail about the valid transforms and
combinations.
Specifies global lifetime values used when IPsec
security associations are negotiated.
See the
Cisco IOS Security Command Reference
for details.
Purpose
Creates a dynamic crypto map entry and enters
crypto map configuration mode.
See the
Cisco IOS Security Command Reference
for more detail about this command.
Specifies which transform sets can be used with
the crypto map entry.
Cisco Secure Router 520 Series Software Configuration Guide
6-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents