Cisco ROUTER-SDM-CD User Manual page 406

User guide
Table of Contents

Advertisement

IPSec Policies
Name
Type
Crypto Maps in this IPSec policy
Cisco Router and Security Device Manager 2.5 User's Guide
17-2
The name of this IPSec policy.
One of the following:
ISAKMP—IKE
will be used to establish the IPSec security associations for
protecting the traffic specified by this crypto map entry. Cisco SDM supports
Internet Security Association and Key Management Protocol (ISAKMP)
crypto maps.
Manual—IKE will not be used to establish the IPSec security associations for
protecting the traffic specified by this crypto map entry.
Cisco SDM does not support the creation of manual crypto maps. Cisco SDM
treats as read-only any manual crypto maps that have been created using the
command-line interface (CLI).
Dynamic—Specifies that this crypto map entry is to reference a preexisting
dynamic crypto map. Dynamic crypto maps are policy templates used in
processing negotiation requests from a peer IPSec device.
Cisco SDM does not support the creation of dynamic crypto maps. Cisco
SDM treats as ready only any dynamic crypto maps created using the CLI.
Name
The name of the IPSec policy of which the crypto map is a part.
Seq. No.
When an IPSec policy is used in a VPN connection, the combination of the
sequence number and IPSec policy name uniquely identifies the connection.
Peers
This column lists the IP addresses or host names of the peer devices specified in
the crypto map. Multiple peers are separated by commas.
Transform Set
This column lists the transform sets used in the crypto map.
Chapter 17
IP Security
OL-4015-12

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ROUTER-SDM-CD and is the answer not in the manual?

This manual is also suitable for:

Router and security device manager 2.5

Table of Contents