Configure Crypto Map; Apply Crypto Map To The Interface - Cisco SA-VAM - VPN Acceleration Module Installation And Configuration Manual

Vpn acceleration module 2+ (vam2+) installation and configuration guide
Table of Contents

Advertisement

Configuration Tasks
Command
Router (config)# access-list access-list-number
{permit | deny} address mask

Configure crypto map

To create crypto map entries that use IKE to establish the security associations, use the following
commands, starting in global configuration mode:
Command
Step 1
Router (config)# crypto map map-name seq-num
ipsec-isakmp
Step 2
Router (config)# set peer {hostname | ip-address}
Step 3
Router (config)# set transform-set
transform-set-name1
[transform-set-name2...transform-set-name6]
Step 4
Router (config)# match address access-list-id

Apply crypto map to the Interface

To apply a crypto map set to an interface, use the following commands, starting in global configuration
mode:
Command
Step 1
Router (config)# interface type number
Step 2
Router (config)# crypto map map-name
Step 3
Router (config)# end
This completes the process for configuring compression on the SA-VAM2+.
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
4-16
Purpose
access-list-number
Specify an integer from 700 to 799 that you select for the list.
permit
Permits the frame.
deny
Denies the frame.
address mask
Specify 48-bit MAC addresses written in dotted triplet form. The
ones bits in the mask argument are the bits to be ignored in the
address value.
Purpose
Create the crypto map and enter crypto map
configuration mode.
Specify a remote IPSec peer. This is the peer to which
IPSec-protected traffic can be forwarded.
Repeat for multiple remote peers.
Specify which transform sets are allowed for this
crypto map entry. List multiple transform sets in
order of priority (highest priority first).
Specify an extended access list. This access list
determines which traffic is protected by IPSec and
which is not.
Purpose
Specify an interface on which to apply the crypto
map and enter interface configuration mode.
Apply a crypto map set to an interface.
Exit interface configuration mode.
Chapter 4
Configuring the SA-VAM2+
OL-5979-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sa-vam2+

Table of Contents