Isakmp Crypto Map Configuration; Configuring Isakmp Crypto Maps - Cisco ASR 5000 Series 3G Home NodeB Administration Manual

3g home nodeb gateway
Table of Contents

Advertisement

▀ ISAKMP Crypto Map Configuration

ISAKMP Crypto Map Configuration
This section provides instructions for configuring ISAKMP crypto maps.
Important:
system. For more information on commands that configure additional parameters and options, refer to the Context
Configuration Mode Commands and Crypto Map ISAKMP Configuration Mode chapters in the Command Line
Interface Reference.
To configure the ISAKMP crypto maps for IPSec:
Step 1
Configure ISAKMP crypto map by applying the example configuration in the
section.
Step 2
Verify your ISAKMP crypto map configuration by following the steps in the
Configuration
section.
Step 3
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command
save configuration
System Administration Guide and the Command Line Interface Reference.

Configuring ISAKMP Crypto Maps

Use the following example to create the ISAKMP crypto map on your system:
configure
context <ctxt_name>
crypto map <map_name> ipsec-isakmp
set peer <agw_address>
set isakmp preshared-key <isakmp_key>
set mode { aggressive | main }
set pfs { group1 | group2 | group5 }
set transform-set <transform_name>
match address <acl_name> [ preference ]
match crypto-group <group_name> { primary | secondary }
end
Notes:
 <
ctxt_name
▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide
156
This section provides the minimum instruction set for configuring ISAKMP crypto maps on the
. For additional information on how to verify and save configuration files, refer to the
> is the system context in which you wish to create and configure the ISAKMP crypto maps.
Configuring ISAKMP Crypto Maps
Verifying the ISAKMP Crypto Map
IP Security
OL-25069-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asr 5000 series

Table of Contents