Apply The Crypto Map To The Physical Interface - Cisco 1812W - Integrated Services Router Wireless Configuration Manual

1800 series integrated services routers
Hide thumbs Also See for 1812W - Integrated Services Router Wireless:
Table of Contents

Advertisement

Apply the Crypto Map to the Physical Interface

Command or Action
Step 3
reverse-route
Example:
Router(config-crypto-map)# reverse-route
Router(config-crypto-map)#
Step 4
exit
Example:
Router(config-crypto-map)# exit
Router(config)#
Step 5
crypto map map-name seq-num [ipsec-isakmp]
[dynamic dynamic-map-name] [discover]
[profile profile-name]
Example:
Router(config)# crypto map static-map 1
ipsec-isakmp dynamic dynmap
Router(config)#
Apply the Crypto Map to the Physical Interface
The crypto maps must be applied to each interface through which IP Security (IPSec) traffic flows.
Applying the crypto map to the physical interface instructs the router to evaluate all the traffic against
the security associations database. With the default configurations, the router provides secure
connectivity by encrypting the traffic sent between remote sites. However, the public interface still
allows the rest of the traffic to pass and provides connectivity to the Internet.
Perform these steps to apply a crypto map to an interface, beginning in global configuration mode:
Command or Action
Step 1
interface type number
Example:
Router(config)# interface fastethernet 0
Router(config-if)#
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
6-8
Chapter 6
Configuring a VPN Using Easy VPN and an IPSec Tunnel
Purpose
Creates source proxy information for the crypto
map entry.
See the
Cisco IOS Security Command Reference
for details.
Returns to global configuration mode.
Creates a crypto map profile.
Purpose
Enters the interface configuration mode for the
interface to which you want the crypto map
applied.
OL-6426-02

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents